CVE-2023-52679

Updated: 2025-08-20 01:47:22.27305

Description:

In the Linux kernel, the following vulnerability has been resolved: of: Fix double free in of_parse_phandle_with_args_map In of_parse_phandle_with_args_map() the inner loop that iterates through the map entries calls of_node_put(new) to free the reference acquired by the previous iteration of the inner loop. This assumes that the value of "new" is NULL on the first iteration of the inner loop. Make sure that this is true in all iterations of the outer loop by setting "new" to NULL after its value is assigned to "cur". Extend the unittest to detect the double free and add an additional test case that actually triggers this path.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0.0
CVSS Version 3.x HIGH 7.8

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

AlmaLinux 9.2 ESU kernel 5.14.0 7.8 HIGH Released CLSA-2025:1743193221 2025-02-22 01:19:12
CentOS 6 ELS kernel 2.6.32 7.8 HIGH Not Vulnerable 2025-09-28 00:17:54
CentOS 7 ELS kernel 3.10.0 7.8 HIGH Not Vulnerable 2025-09-16 14:08:59
CentOS 8.4 ELS kernel 4.18.0 7.8 HIGH Not Vulnerable 2025-12-15 13:55:35
CentOS 8.5 ELS kernel 4.18.0 7.8 HIGH Not Vulnerable 2026-01-27 08:08:07
CentOS Stream 8 ELS kernel 4.18.0 7.8 HIGH Not Vulnerable CLSA-2025:1763722365 2025-12-15 17:42:34
CloudLinux 6 ELS kernel 2.6.32 7.8 HIGH Ignored 2025-09-23 10:56:56 Postponed until request or high risk detected
CloudLinux 7 ELS kernel 3.10.0 7.8 HIGH Ignored 2025-09-23 10:56:52 Postponed until request or high risk detected
Oracle Linux 6 ELS kernel 2.6.32 7.8 HIGH Not Vulnerable 2025-11-02 11:10:30