In the Linux kernel, the following vulnerability has been resolved:
spmi: mediatek: Fix UAF on device remove
The pmif driver data that contains the clocks is allocated along with
spmi_controller.
On device remove, spmi_controller will be freed first, and then devres
, including the clocks, will be cleanup.
This leads to UAF because putting the clocks will access the clocks in
the pmif driver data, which is already freed along with spmi_controller.
This can be reproduced by enabling DEBUG_TEST_DRIVER_REMOVE and
building the kernel with KASAN.
Fix the UAF issue by using unmanaged clk_bulk_get() and putting the
clocks before freeing spmi_controller.
References
Configurations
Configuration 1 (hide)
|
History
14 Mar 2025, 18:58
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
First Time |
Linux
Linux linux Kernel |
|
References | () https://git.kernel.org/stable/c/521f28eedd6b14228c46e3b81e3bf9b90c2818d8 - Patch | |
References | () https://git.kernel.org/stable/c/9a3881b1f07db1bb55cb0108e6f05cfd027eaf2e - Patch | |
References | () https://git.kernel.org/stable/c/e821d50ab5b956ed0effa49faaf29912fd4106d9 - Patch | |
References | () https://git.kernel.org/stable/c/f8dcafcb54632536684336161da8bdd52120f95e - Patch |
21 Nov 2024, 08:40
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/521f28eedd6b14228c46e3b81e3bf9b90c2818d8 - | |
References | () https://git.kernel.org/stable/c/9a3881b1f07db1bb55cb0108e6f05cfd027eaf2e - | |
References | () https://git.kernel.org/stable/c/e821d50ab5b956ed0effa49faaf29912fd4106d9 - | |
References | () https://git.kernel.org/stable/c/f8dcafcb54632536684336161da8bdd52120f95e - |
06 Aug 2024, 14:35
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-416 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 3.8 |
06 Mar 2024, 07:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-03-06 07:15
Updated : 2025-03-14 18:58
NVD link : CVE-2023-52584
Mitre link : CVE-2023-52584
CVE.ORG link : CVE-2023-52584
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free