In the Linux kernel, the following vulnerability has been resolved: drivers/amd/pm: fix a use-after-free in kv_parse_power_table When ps allocated by kzalloc equals to NULL, kv_parse_power_table frees adev->pm.dpm.ps that allocated before. However, after the control flow goes through the following call chains: kv_parse_power_table |-> kv_dpm_init |-> kv_dpm_sw_init |-> kv_dpm_fini The adev->pm.dpm.ps is used in the for loop of kv_dpm_fini after its first free in kv_parse_power_table and causes a use-after-free bug.
History

Fri, 22 Nov 2024 12:00:00 +0000


Mon, 04 Nov 2024 15:15:00 +0000

Type Values Removed Values Added
References
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 08 Aug 2024 19:15:00 +0000

Type Values Removed Values Added
First Time appeared Redhat
Redhat enterprise Linux
CPEs cpe:/a:redhat:enterprise_linux:8::nfv
cpe:/o:redhat:enterprise_linux:8
Vendors & Products Redhat
Redhat enterprise Linux

cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published: 2024-02-25T08:16:33.016Z

Updated: 2024-11-04T14:47:25.111Z

Reserved: 2024-02-20T12:30:33.297Z

Link: CVE-2023-52469

cve-icon Vulnrichment

Updated: 2024-08-02T23:03:19.779Z

cve-icon NVD

Status : Modified

Published: 2024-02-26T16:27:48.767

Modified: 2024-11-21T08:39:50.497

Link: CVE-2023-52469

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-02-26T00:00:00Z

Links: CVE-2023-52469 - Bugzilla