Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2023-52859
HistoryMay 21, 2024 - 4:15 p.m.

CVE-2023-52859

2024-05-2116:15:22
Debian Security Bug Tracker
security-tracker.debian.org
2
linux kernel
vulnerability
use-after-free
pmu
fix
error handling
cpuhp

6.9 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.7%

In the Linux kernel, the following vulnerability has been resolved: perf: hisi: Fix use-after-free when register pmu fails When we fail to register the uncore pmu, the pmu context may not been allocated. The error handing will call cpuhp_state_remove_instance() to call uncore pmu offline callback, which migrate the pmu context. Since that’s liable to lead to some kind of use-after-free. Use cpuhp_state_remove_instance_nocalls() instead of cpuhp_state_remove_instance() so that the notifiers don’t execute after the PMU device has been failed to register.

6.9 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.7%

Related for DEBIANCVE:CVE-2023-52859