CVE-2023-52469

Updated: 2024-06-27 22:47:06.635254

Description:

In the Linux kernel, the following vulnerability has been resolved: drivers/amd/pm: fix a use-after-free in kv_parse_power_table When ps allocated by kzalloc equals to NULL, kv_parse_power_table frees adev->pm.dpm.ps that allocated before. However, after the control flow goes through the following call chains: kv_parse_power_table |-> kv_dpm_init |-> kv_dpm_sw_init |-> kv_dpm_fini The adev->pm.dpm.ps is used in the for loop of kv_dpm_fini after its first free in kv_parse_power_table and causes a use-after-free bug.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0
CVSS Version 3.x HIGH 7.8

Status

OS name Project name Version Score Severity Status Errata Last updated
AlmaLinux 9.2 ESU kernel 5.14.0 7.8 HIGH Released CLSA-2024:1715000325 2024-05-06 14:29:19
AlmaLinux 9.2 FIPS kernel 5.14.0 7.8 HIGH Released CLSA-2024:1715000749 2024-05-06 14:29:20
CentOS 6 ELS kernel 2.6.32 7.8 HIGH Not Vulnerable 2024-08-22 12:18:35
CentOS 7 ELS kernel 3.10.0 7.8 HIGH Released CLSA-2024:1724693366 2024-09-09 12:15:33
CentOS 8.4 ELS kernel 4.18.0 7.8 HIGH Not Vulnerable 2024-08-20 05:39:56
CentOS 8.5 ELS kernel 4.18.0 7.8 HIGH Not Vulnerable 2024-08-27 03:56:31
CentOS Stream 8 ELS kernel 4.18.0 7.8 HIGH Not Vulnerable 2024-08-27 03:44:46
CloudLinux 6 ELS kernel 2.6.32 7.8 HIGH Not Vulnerable 2024-08-22 12:18:35
CloudLinux 7 ELS kernel 3.10.0 7.8 HIGH Needs Triage 2024-08-13 01:47:36
Oracle Linux 6 ELS kernel 2.6.32 7.8 HIGH Not Vulnerable 2024-08-22 12:18:34
Total: 13