-
CVE-2023-54026
- EPSS 0.03%
- Veröffentlicht 24.12.2025 10:55:55
- Zuletzt bearbeitet 15.04.2026 00:35:42
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
opp: Fix use-after-free in lazy_opp_tables after probe deferral
In the Linux kernel, the following vulnerability has been resolved: opp: Fix use-after-free in lazy_opp_tables after probe deferral When dev_pm_opp_of_find_icc_paths() in _allocate_opp_table() returns -EPROBE_DEFER, the opp_table is freed again, to wait until all the interconnect paths are available. However, if the OPP table is using required-opps then it may already have been added to the global lazy_opp_tables list. The error path does not remove the opp_table from the list again. This can cause crashes later when the provider of the required-opps is added, since we will iterate over OPP tables that have already been freed. E.g.: Unable to handle kernel NULL pointer dereference when read CPU: 0 PID: 7 Comm: kworker/0:0 Not tainted 6.4.0-rc3 PC is at _of_add_opp_table_v2 (include/linux/of.h:949 drivers/opp/of.c:98 drivers/opp/of.c:344 drivers/opp/of.c:404 drivers/opp/of.c:1032) -> lazy_link_required_opp_table() Fix this by calling _of_clear_opp_table() to remove the opp_table from the list and clear other allocated resources. While at it, also add the missing mutex_destroy() calls in the error path.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version
7eba0c7641b0009818e469dbfcdd87a0155ab9d4
Version <
39a0e723d3502f6dc4c603f57ebe8dc7bcc4a4bc
Status
affected
Version
7eba0c7641b0009818e469dbfcdd87a0155ab9d4
Version <
76ab057de777723ec924654502d1a260ba7d7d54
Status
affected
Version
7eba0c7641b0009818e469dbfcdd87a0155ab9d4
Version <
c05e76d6b249e5254c31994eedd06dd3cc90dee0
Status
affected
Version
7eba0c7641b0009818e469dbfcdd87a0155ab9d4
Version <
b2a2ab039bd58f51355e33d7d3fc64605d7f870d
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
5.12
Status
affected
Version
0
Version <
5.12
Status
unaffected
Version <=
5.15.*
Version
5.15.121
Status
unaffected
Version <=
6.1.*
Version
6.1.40
Status
unaffected
Version <=
6.4.*
Version
6.4.5
Status
unaffected
Version <=
*
Version
6.5
Status
unaffected
VulnDex Vulnerability Enrichment
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.03% | 0.099 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|