Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-52469
HistoryFeb 26, 2024 - 12:00 a.m.

CVE-2023-52469

2024-02-2600:00:00
ubuntu.com
ubuntu.com
13
use-after-free
kv_parse_power_table
kv_dpm_fini
linux kernel
drivers/amd/pm
vulnerability

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.8

Confidence

High

EPSS

0

Percentile

5.1%

In the Linux kernel, the following vulnerability has been resolved:
drivers/amd/pm: fix a use-after-free in kv_parse_power_table When ps
allocated by kzalloc equals to NULL, kv_parse_power_table frees
adev->pm.dpm.ps that allocated before. However, after the control flow goes
through the following call chains: kv_parse_power_table |-> kv_dpm_init |->
kv_dpm_sw_init |-> kv_dpm_fini The adev->pm.dpm.ps is used in the for loop
of kv_dpm_fini after its first free in kv_parse_power_table and causes a
use-after-free bug.

Notes

Author Note
Priority reason: Use after free but only occurs on allocation failure which is very unlikely for an attacker to be able to influence and hence cause.
rodrigo-zaiden USN-6765-1 for linux-oem-6.5 wrongly stated that this CVE was fixed in version 6.5.0-1022.23. The mentioned notice was revoked and the state of the fix for linux-oem-6.5 was recovered to the previous state.
Rows per page:
1-10 of 841

References

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.8

Confidence

High

EPSS

0

Percentile

5.1%