Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-52492
HistoryMar 11, 2024 - 12:00 a.m.

CVE-2023-52492

2024-03-1100:00:00
ubuntu.com
ubuntu.com
7
linux kernel
dmaengine
null pointer vulnerability
unregistration function

7.6 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

10.4%

In the Linux kernel, the following vulnerability has been resolved:
dmaengine: fix NULL pointer in channel unregistration function
__dma_async_device_channel_register() can fail. In case of failure,
chan->local is freed (with free_percpu()), and chan->local is nullified.
When dma_async_device_unregister() is called (because of managed API or
intentionally by DMA controller driver), channels are unconditionally
unregistered, leading to this NULL pointer: [ 1.318693] Unable to handle
kernel NULL pointer dereference at virtual address 00000000000000d0 […] [
1.484499] Call trace: [ 1.486930] device_del+0x40/0x394 [ 1.490314]
device_unregister+0x20/0x7c [ 1.494220]
__dma_async_device_channel_unregister+0x68/0xc0 Look at
dma_async_device_register() function error path, channel device
unregistration is done only if chan->local is not NULL. Then add the same
condition at the beginning of __dma_async_device_channel_unregister()
function, to avoid NULL pointer issue whatever the API used to reach this
function.

Notes

Author Note
rodrigo-zaiden USN-6765-1 for linux-oem-6.5 wrongly stated that this CVE was fixed in version 6.5.0-1022.23. The mentioned notice was revoked and the state of the fix for linux-oem-6.5 was recovered to the previous state.

References

7.6 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

10.4%