Use After Free Affecting kernel-rt package, versions *
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-CENTOS7-KERNELRT-6382098
- published 5 Mar 2024
- disclosed 29 Feb 2024
Introduced: 29 Feb 2024
CVE-2023-52475 Open this link in a new tabHow to fix?
There is no fixed version for Centos:7
kernel-rt
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream kernel-rt
package and not the kernel-rt
package as distributed by Centos
.
See How to fix?
for Centos:7
relevant fixed versions and status.
In the Linux kernel, the following vulnerability has been resolved:
Input: powermate - fix use-after-free in powermate_config_complete
syzbot has found a use-after-free bug [1] in the powermate driver. This happens when the device is disconnected, which leads to a memory free from the powermate_device struct. When an asynchronous control message completes after the kfree and its callback is invoked, the lock does not exist anymore and hence the bug.
Use usb_kill_urb() on pm->config to cancel any in-progress requests upon device disconnection.
[1] https://syzkaller.appspot.com/bug?extid=0434ac83f907a1dbdd1e
References
- https://access.redhat.com/security/cve/CVE-2023-52475
- https://git.kernel.org/stable/c/2efe67c581a2a6122b328d4bb6f21b3f36f40d46
- https://git.kernel.org/stable/c/5aa514100aaf59868d745196258269a16737c7bd
- https://git.kernel.org/stable/c/5c15c60e7be615f05a45cd905093a54b11f461bc
- https://git.kernel.org/stable/c/67cace72606baf1758fd60feb358f4c6be92e1cc
- https://git.kernel.org/stable/c/6a4a396386404e62fb59bc3bde48871a64a82b4f
- https://git.kernel.org/stable/c/8677575c4f39d65bf0d719b5d20e8042e550ccb9
- https://git.kernel.org/stable/c/cd2fbfd8b922b7fdd50732e47d797754ab59cb06
- https://git.kernel.org/stable/c/e528b1b9d60743e0b26224e3fe7aa74c24b8b2f8