In the Linux kernel, the following vulnerability has been resolved:
perf/x86/intel/uncore: Fix NULL pointer dereference issue in upi_fill_topology()
Get logical socket id instead of physical id in discover_upi_topology()
to avoid out-of-bound access on 'upi = &type->topology[nid][idx];' line
that leads to NULL pointer dereference in upi_fill_topology()
Metrics
Affected Vendors & Products
References
History
Sat, 19 Oct 2024 02:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat enterprise Linux
|
|
CPEs | cpe:/a:redhat:enterprise_linux:9 cpe:/o:redhat:enterprise_linux:9 |
|
Vendors & Products |
Redhat enterprise Linux
|
Wed, 11 Sep 2024 13:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: Linux
Published: 2024-02-22T16:21:41.661Z
Updated: 2024-11-04T14:46:58.132Z
Reserved: 2024-02-20T12:30:33.293Z
Link: CVE-2023-52450
Vulnrichment
Updated: 2024-08-02T22:55:41.573Z
NVD
Status : Modified
Published: 2024-02-22T17:15:08.733
Modified: 2024-11-21T08:39:47.733
Link: CVE-2023-52450
Redhat