CVE-2023-52584
Published: March 7, 2024Last modified: March 7, 2024
Description
In the Linux kernel, the following vulnerability has been resolved: spmi: mediatek: Fix UAF on device remove The pmif driver data that contains the clocks is allocated along with spmi_controller. On device remove, spmi_controller will be freed first, and then devres , including the clocks, will be cleanup. This leads to UAF because putting the clocks will access the clocks in the pmif driver data, which is already freed along with spmi_controller. This can be reproduced by enabling DEBUG_TEST_DRIVER_REMOVE and building the kernel with KASAN. Fix the UAF issue by using unmanaged clk_bulk_get() and putting the clocks before freeing spmi_controller.
Severity score breakdown
Parameter | Value |
---|---|
Base score | 3.8 |
Attack Vector | NETWORK |
Attack complexity | LOW |
Privileges required | HIGH |
User interaction | NONE |
Scope | UNCHANGED |
Confidentiality | LOW |
Integrity impact | LOW |
Availability impact | NONE |
Vector | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N |
Status
Product | Release | Package | Status |
---|---|---|---|
Alpaquita Linux | 23 LTS | linux-lts | Fixed (6.1.81-r0) |
Stream | linux-lts | Fixed (6.6.58-r0) |