Overview
- Description
- In the Linux kernel, the following vulnerability has been resolved: ntb: intel: Fix the NULL vs IS_ERR() bug for debugfs_create_dir() The debugfs_create_dir() function returns error pointers. It never returns NULL. So use IS_ERR() to check it.
- Source
- 416baaa9-dc9f-4396-8d5f-8c081fb06d67
- NVD status
- Modified
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 5.5
- Impact score
- 3.6
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
- Severity
- MEDIUM
Weaknesses
- nvd@nist.gov
- NVD-CWE-noinfo
Social media
- Hype score
- Not currently trending
🚨 CVE-2023-52917 (Published: 2024-10-21) - A critical vulnerability in the Linux Foundation's nan. Affects specific versions. Remediation is available! Ensure your systems are updated to protect against potential exploits. More info: https://t.co/ZeAn0rzLii #CyberSecurity #Linux
@transilienceai
21 Oct 2024
16 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2023-52917 (Published: 2024-10-21) - A critical vulnerability affecting Linux Foundation nan. Exploited in specific versions. 🛠️ Remediation is crucial! Check the patch details here: https://t.co/ZeAn0rzLii #CyberSecurity #Linux #VulnerabilityAlert
@transilienceai
21 Oct 2024
16 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🔒 CVE-2023-52917 (Published: 2024-10-21) - A critical vulnerability in Linux Foundation nan affects multiple versions. Users are urged to upgrade to the latest patch available at [Kernel Git](https://t.co/ZeAn0rzLii) to mitigate risks. Stay secure! #CyberSecurity #Linux
@transilienceai
21 Oct 2024
16 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2023-52917 (Published: 2024-10-21) affects Intel products. Exploited in specific versions, this vulnerability poses significant risks. Users are urged to update to the latest patches available at [Kernel Git](https://t.co/VMq9oh9bRb) to mitigate potential threats.… https:/
@transilienceai
21 Oct 2024
10 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2023-52917 (Published: 2024-10-21) - A critical vulnerability in Intel nan affects multiple versions. Users are urged to update to the latest patched versions to mitigate risks. For detailed remediation steps, check the official patch here: https://t.co/n0XmGlggqy… https:/
@transilienceai
21 Oct 2024
12 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2023-52917 (Published: 2024-10-21) - A critical vulnerability in the Linux Kernel affects multiple versions. Users are urged to update to the latest stable release to mitigate risks. For more details, check the patch here: https://t.co/n0XmGlggqy #CyberSecurity… https://t.
@transilienceai
21 Oct 2024
11 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2023-52917 (Published: 2024-10-21) affects Huawei products. Vulnerable versions are impacted, allowing potential exploitation. 🛠️ Remediation is crucial! Check the patch details here: https://t.co/suEfc3O9qV. Stay secure! #CyberSecurity #CVE
@transilienceai
21 Oct 2024
16 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2023-52917 (Published: 2024-10-21) affects Intel products. Exploited in specific versions, this vulnerability poses significant risks. 🛡️ Ensure your systems are updated with the latest patches from the official kernel repository: https://t.co/suEfc3O9qV #CyberSecurity… h
@transilienceai
21 Oct 2024
12 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2023-52917 (Published: 2024-10-21) - High severity vulnerability in Linux nan. Affects specific versions. Ensure your systems are updated to the latest patch to mitigate risks. For more details, check the official remediation: https://t.co/xM7e7mZubb #CyberSecurity #Linux
@transilienceai
21 Oct 2024
14 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2023-52917 (Published: 2024-10-21) - A critical vulnerability in Linux nan affects multiple versions. Ensure your systems are updated to the latest patch to mitigate risks. For more details, check the official remediation here: https://t.co/bDjyLMUsdR #CyberSecurity #Linux
@transilienceai
21 Oct 2024
13 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2023-52917 (Published: 2024-10-21) - A critical vulnerability affecting Intel products. Ensure your systems are updated to the latest versions to mitigate risks. For detailed remediation steps, check the patch here: https://t.co/bDjyLMUsdR #CyberSecurity #Intel
@transilienceai
21 Oct 2024
13 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2023-52917 (Published: 2024-10-21) - Critical vulnerability in Linux nan. Affects specific versions. Ensure your systems are updated to the latest patch to mitigate risks. For details, check the remediation here: https://t.co/099P10Sb5S #CyberSecurity #Linux
@transilienceai
21 Oct 2024
13 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2023-52917 Null Pointer Fix in Linux Kernel debugfs_create_dir() Function In the Linux kernel, a vulnerability has been fixed in the 'ntb: intel' section. The issue was with the debugfs_create_dir() function.... https://t.co/1kHRrrGccq
@VulmonFeeds
21 Oct 2024
22 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8A07E653-16C3-4150-BD19-62B6DF148F6C", "versionEndExcluding": "5.10.227", "versionStartIncluding": "4.2" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4D51C05D-455B-4D8D-89E7-A58E140B864C", "versionEndExcluding": "5.15.168", "versionStartIncluding": "5.11" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D01BD22E-ACD1-4618-9D01-6116570BE1EE", "versionEndExcluding": "6.1.113", "versionStartIncluding": "5.16" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D448821D-C085-4CAF-88FA-2DDE7BE21976", "versionEndExcluding": "6.6.54", "versionStartIncluding": "6.2" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CE94BB8D-B0AB-4563-9ED7-A12122B56EBE", "versionEndExcluding": "6.10.13", "versionStartIncluding": "6.7" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AB755D26-97F4-43B6-8604-CD076811E181", "versionEndExcluding": "6.11.2", "versionStartIncluding": "6.11" } ], "operator": "OR" } ] } ]