U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2023-52917 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: ntb: intel: Fix the NULL vs IS_ERR() bug for debugfs_create_dir() The debugfs_create_dir() function returns error pointers. It never returns NULL. So use IS_ERR() to check it.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
https://git.kernel.org/stable/c/16e5bed6c1883b19f9fcbdff996aa3381954d5f3 Patch 
https://git.kernel.org/stable/c/20cbc281033ef5324f67f2d54bc539968f937255
https://git.kernel.org/stable/c/4b2fbba4e44630a59b09d32627b63c4ffdf70f78
https://git.kernel.org/stable/c/7cbd6d7fb9ba2be03978809c848e2e50eaeead2c Patch 
https://git.kernel.org/stable/c/a429158f2e0a7a03eb67fd5e204e1f6735c725aa Patch 
https://git.kernel.org/stable/c/b66bf833e72a1e23d7ccafc0f8f74e80f8c357b5 Patch 
https://git.kernel.org/stable/c/babba8595d1e5d57313a6187f3e51aceacc6881a Patch 
https://git.kernel.org/stable/c/e229897d373a87ee09ec5cc4ecd4bb2f895fc16b Patch 
https://git.kernel.org/stable/c/ef7e34237e2612b116a84c9640628a6f7a0d693e Patch 

Weakness Enumeration

CWE-ID CWE Name Source
NVD-CWE-noinfo Insufficient Information cwe source acceptance level NIST  

Known Affected Software Configurations Switch to CPE 2.2

CPEs loading, please wait.

Denotes Vulnerable Software
Are we missing a CPE here? Please let us know.

Change History

3 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2023-52917
NVD Published Date:
10/21/2024
NVD Last Modified:
11/08/2024
Source:
kernel.org