CVE-2023-52584

In the Linux kernel, the following vulnerability has been resolved: spmi: mediatek: Fix UAF on device remove The pmif driver data that contains the clocks is allocated along with spmi_controller. On device remove, spmi_controller will be freed first, and then devres , including the clocks, will be cleanup. This leads to UAF because putting the clocks will access the clocks in the pmif driver data, which is already freed along with spmi_controller. This can be reproduced by enabling DEBUG_TEST_DRIVER_REMOVE and building the kernel with KASAN. Fix the UAF issue by using unmanaged clk_bulk_get() and putting the clocks before freeing spmi_controller.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

14 Mar 2025, 18:58

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/521f28eedd6b14228c46e3b81e3bf9b90c2818d8 - () https://git.kernel.org/stable/c/521f28eedd6b14228c46e3b81e3bf9b90c2818d8 - Patch
References () https://git.kernel.org/stable/c/9a3881b1f07db1bb55cb0108e6f05cfd027eaf2e - () https://git.kernel.org/stable/c/9a3881b1f07db1bb55cb0108e6f05cfd027eaf2e - Patch
References () https://git.kernel.org/stable/c/e821d50ab5b956ed0effa49faaf29912fd4106d9 - () https://git.kernel.org/stable/c/e821d50ab5b956ed0effa49faaf29912fd4106d9 - Patch
References () https://git.kernel.org/stable/c/f8dcafcb54632536684336161da8bdd52120f95e - () https://git.kernel.org/stable/c/f8dcafcb54632536684336161da8bdd52120f95e - Patch

21 Nov 2024, 08:40

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/521f28eedd6b14228c46e3b81e3bf9b90c2818d8 - () https://git.kernel.org/stable/c/521f28eedd6b14228c46e3b81e3bf9b90c2818d8 -
References () https://git.kernel.org/stable/c/9a3881b1f07db1bb55cb0108e6f05cfd027eaf2e - () https://git.kernel.org/stable/c/9a3881b1f07db1bb55cb0108e6f05cfd027eaf2e -
References () https://git.kernel.org/stable/c/e821d50ab5b956ed0effa49faaf29912fd4106d9 - () https://git.kernel.org/stable/c/e821d50ab5b956ed0effa49faaf29912fd4106d9 -
References () https://git.kernel.org/stable/c/f8dcafcb54632536684336161da8bdd52120f95e - () https://git.kernel.org/stable/c/f8dcafcb54632536684336161da8bdd52120f95e -

06 Aug 2024, 14:35

Type Values Removed Values Added
CWE CWE-416
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 3.8

06 Mar 2024, 07:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-06 07:15

Updated : 2025-03-14 18:58


NVD link : CVE-2023-52584

Mitre link : CVE-2023-52584

CVE.ORG link : CVE-2023-52584


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free