CVE-2023-52585

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper() Return invalid error code -EINVAL for invalid block id. Fixes the below: drivers/gpu/drm/amd/amdgpu/amdgpu_ras.c:1183 amdgpu_ras_query_error_status_helper() error: we previously assumed 'info' could be null (see line 1176)
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:netapp:h610c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h610c:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:netapp:h610s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h610s:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:netapp:h615c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h615c:-:*:*:*:*:*:*:*

History

14 Mar 2025, 18:57

Type Values Removed Values Added
First Time Netapp
Netapp h610s Firmware
Linux
Netapp h610c
Netapp h615c
Netapp h615c Firmware
Debian
Debian debian Linux
Netapp h610c Firmware
Netapp h610s
Linux linux Kernel
CPE cpe:2.3:h:netapp:h610s:-:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h610s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h615c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h610c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h615c:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h610c:-:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/0eb296233f86750102aa43b97879b8d8311f249a - () https://git.kernel.org/stable/c/0eb296233f86750102aa43b97879b8d8311f249a - Patch
References () https://git.kernel.org/stable/c/195a6289282e039024ad30ba66e6f94a4d0fbe49 - () https://git.kernel.org/stable/c/195a6289282e039024ad30ba66e6f94a4d0fbe49 - Patch
References () https://git.kernel.org/stable/c/467139546f3fb93913de064461b1a43a212d7626 - () https://git.kernel.org/stable/c/467139546f3fb93913de064461b1a43a212d7626 - Patch
References () https://git.kernel.org/stable/c/7e6d6f27522bcd037856234b720ff607b9c4a09b - () https://git.kernel.org/stable/c/7e6d6f27522bcd037856234b720ff607b9c4a09b - Patch
References () https://git.kernel.org/stable/c/92cb363d16ac1e41c9764cdb513d0e89a6ff4915 - () https://git.kernel.org/stable/c/92cb363d16ac1e41c9764cdb513d0e89a6ff4915 - Patch
References () https://git.kernel.org/stable/c/b8d55a90fd55b767c25687747e2b24abd1ef8680 - () https://git.kernel.org/stable/c/b8d55a90fd55b767c25687747e2b24abd1ef8680 - Patch
References () https://git.kernel.org/stable/c/c364e7a34c85c2154fb2e47561965d5b5a0b69b1 - () https://git.kernel.org/stable/c/c364e7a34c85c2154fb2e47561965d5b5a0b69b1 - Patch
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00019.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00019.html - Mailing List
References () https://security.netapp.com/advisory/ntap-20240912-0009/ - () https://security.netapp.com/advisory/ntap-20240912-0009/ - Mailing List

21 Nov 2024, 08:40

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00019.html -
  • () https://security.netapp.com/advisory/ntap-20240912-0009/ -
References () https://git.kernel.org/stable/c/0eb296233f86750102aa43b97879b8d8311f249a - () https://git.kernel.org/stable/c/0eb296233f86750102aa43b97879b8d8311f249a -
References () https://git.kernel.org/stable/c/195a6289282e039024ad30ba66e6f94a4d0fbe49 - () https://git.kernel.org/stable/c/195a6289282e039024ad30ba66e6f94a4d0fbe49 -
References () https://git.kernel.org/stable/c/467139546f3fb93913de064461b1a43a212d7626 - () https://git.kernel.org/stable/c/467139546f3fb93913de064461b1a43a212d7626 -
References () https://git.kernel.org/stable/c/7e6d6f27522bcd037856234b720ff607b9c4a09b - () https://git.kernel.org/stable/c/7e6d6f27522bcd037856234b720ff607b9c4a09b -
References () https://git.kernel.org/stable/c/92cb363d16ac1e41c9764cdb513d0e89a6ff4915 - () https://git.kernel.org/stable/c/92cb363d16ac1e41c9764cdb513d0e89a6ff4915 -
References () https://git.kernel.org/stable/c/b8d55a90fd55b767c25687747e2b24abd1ef8680 - () https://git.kernel.org/stable/c/b8d55a90fd55b767c25687747e2b24abd1ef8680 -
References () https://git.kernel.org/stable/c/c364e7a34c85c2154fb2e47561965d5b5a0b69b1 - () https://git.kernel.org/stable/c/c364e7a34c85c2154fb2e47561965d5b5a0b69b1 -

06 Nov 2024, 16:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE CWE-476

04 Nov 2024, 13:16

Type Values Removed Values Added
References
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00019.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}

27 Jun 2024, 14:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00019.html -

25 May 2024, 15:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/0eb296233f86750102aa43b97879b8d8311f249a -
  • () https://git.kernel.org/stable/c/467139546f3fb93913de064461b1a43a212d7626 -
  • () https://git.kernel.org/stable/c/7e6d6f27522bcd037856234b720ff607b9c4a09b -
  • () https://git.kernel.org/stable/c/92cb363d16ac1e41c9764cdb513d0e89a6ff4915 -
  • () https://git.kernel.org/stable/c/c364e7a34c85c2154fb2e47561965d5b5a0b69b1 -

06 Mar 2024, 15:18

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-06 07:15

Updated : 2025-03-14 18:57


NVD link : CVE-2023-52585

Mitre link : CVE-2023-52585

CVE.ORG link : CVE-2023-52585


JSON object : View

Products Affected

linux

  • linux_kernel

netapp

  • h610c_firmware
  • h615c_firmware
  • h610s_firmware
  • h615c
  • h610s
  • h610c

debian

  • debian_linux
CWE
CWE-476

NULL Pointer Dereference