Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

CVE-2023-53484

Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
01/10/2025
Última modificación:
02/10/2025

Descripción

*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> lib: cpu_rmap: Avoid use after free on rmap-&gt;obj array entries<br /> <br /> When calling irq_set_affinity_notifier() with NULL at the notify<br /> argument, it will cause freeing of the glue pointer in the<br /> corresponding array entry but will leave the pointer in the array. A<br /> subsequent call to free_irq_cpu_rmap() will try to free this entry again<br /> leading to possible use after free.<br /> <br /> Fix that by setting NULL to the array entry and checking that we have<br /> non-zero at the array entry when iterating over the array in<br /> free_irq_cpu_rmap().<br /> <br /> The current code does not suffer from this since there are no cases<br /> where irq_set_affinity_notifier(irq, NULL) (note the NULL passed for the<br /> notify arg) is called, followed by a call to free_irq_cpu_rmap() so we<br /> don&amp;#39;t hit and issue. Subsequent patches in this series excersize this<br /> flow, hence the required fix.

Impacto