{"id":"CVE-2023-52686","summary":"powerpc/powernv: Add a null pointer check in opal_event_init()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/powernv: Add a null pointer check in opal_event_init()\n\nkasprintf() returns a pointer to dynamically allocated memory\nwhich can be NULL upon failure.","modified":"2026-04-02T09:43:13.794250Z","published":"2024-05-17T14:24:47.984Z","related":["ALSA-2024:4211","SUSE-SU-2024:1979-1","SUSE-SU-2024:1983-1","SUSE-SU-2024:2008-1","SUSE-SU-2024:2010-1","SUSE-SU-2024:2011-1","SUSE-SU-2024:2019-1","SUSE-SU-2024:2135-1","SUSE-SU-2024:2183-1","SUSE-SU-2024:2184-1","SUSE-SU-2024:2185-1","SUSE-SU-2024:2189-1","SUSE-SU-2024:2190-1","SUSE-SU-2024:2203-1","SUSE-SU-2024:2923-1","SUSE-SU-2024:2948-1","SUSE-SU-2024:2973-1","SUSE-SU-2025:20008-1","SUSE-SU-2025:20028-1","SUSE-SU-2025:20166-1","SUSE-SU-2025:20249-1","USN-6818-2","USN-6819-2"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52686.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/8422d179cf46889c15ceff9ede48c5bfa4e7f0b4"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8649829a1dd25199bbf557b2621cedb4bf9b3050"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9a523e1da6d88c2034f946adfa4f74b236c95ca9"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a14c55eb461d630b836f80591d8caf1f74e62877"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c0b111ea786ddcc8be0682612830796ece9436c7"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e08c2e275fa1874de945b87093f925997722ee42"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e6ad05e3ae9c84c5a71d7bb2d44dc845ae7990cf"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e93d7cf4c1ddbcd846739e7ad849f955a4f18031"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52686.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52686"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"2717a33d60745f2f72e521cdaedf79b00f66f8ca"},{"fixed":"8422d179cf46889c15ceff9ede48c5bfa4e7f0b4"},{"fixed":"e93d7cf4c1ddbcd846739e7ad849f955a4f18031"},{"fixed":"e6ad05e3ae9c84c5a71d7bb2d44dc845ae7990cf"},{"fixed":"c0b111ea786ddcc8be0682612830796ece9436c7"},{"fixed":"9a523e1da6d88c2034f946adfa4f74b236c95ca9"},{"fixed":"a14c55eb461d630b836f80591d8caf1f74e62877"},{"fixed":"e08c2e275fa1874de945b87093f925997722ee42"},{"fixed":"8649829a1dd25199bbf557b2621cedb4bf9b3050"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-52686.json"}}],"schema_version":"1.7.5"}