CVE-2023-52679

Severity CVSS v4.0:
Pending analysis
Type:
CWE-415 Double Free
Publication date:
17/05/2024
Last modified:
10/01/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> of: Fix double free in of_parse_phandle_with_args_map<br /> <br /> In of_parse_phandle_with_args_map() the inner loop that<br /> iterates through the map entries calls of_node_put(new)<br /> to free the reference acquired by the previous iteration<br /> of the inner loop. This assumes that the value of "new" is<br /> NULL on the first iteration of the inner loop.<br /> <br /> Make sure that this is true in all iterations of the outer<br /> loop by setting "new" to NULL after its value is assigned to "cur".<br /> <br /> Extend the unittest to detect the double free and add an additional<br /> test case that actually triggers this path.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.17 (including) 4.19.306 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.20 (including) 5.4.268 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.209 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.148 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.75 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.14 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.7.2 (excluding)
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*