U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2023-52679 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: of: Fix double free in of_parse_phandle_with_args_map In of_parse_phandle_with_args_map() the inner loop that iterates through the map entries calls of_node_put(new) to free the reference acquired by the previous iteration of the inner loop. This assumes that the value of "new" is NULL on the first iteration of the inner loop. Make sure that this is true in all iterations of the outer loop by setting "new" to NULL after its value is assigned to "cur". Extend the unittest to detect the double free and add an additional test case that actually triggers this path.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
https://git.kernel.org/stable/c/26b4d702c44f9e5cf3c5c001ae619a4a001889db
https://git.kernel.org/stable/c/26b4d702c44f9e5cf3c5c001ae619a4a001889db
https://git.kernel.org/stable/c/4541004084527ce9e95a818ebbc4e6b293ffca21
https://git.kernel.org/stable/c/4541004084527ce9e95a818ebbc4e6b293ffca21
https://git.kernel.org/stable/c/4dde83569832f9377362e50f7748463340c5db6b
https://git.kernel.org/stable/c/4dde83569832f9377362e50f7748463340c5db6b
https://git.kernel.org/stable/c/a0a061151a6200c13149dbcdb6c065203c8425d2
https://git.kernel.org/stable/c/a0a061151a6200c13149dbcdb6c065203c8425d2
https://git.kernel.org/stable/c/b64d09a4e8596f76d27f4b4a90a1cf6baf6a82f8
https://git.kernel.org/stable/c/b64d09a4e8596f76d27f4b4a90a1cf6baf6a82f8
https://git.kernel.org/stable/c/b9d760dae5b10e73369b769073525acd7b3be2bd
https://git.kernel.org/stable/c/b9d760dae5b10e73369b769073525acd7b3be2bd
https://git.kernel.org/stable/c/cafa992134124e785609a406da4ff2b54052aff7
https://git.kernel.org/stable/c/cafa992134124e785609a406da4ff2b54052aff7
https://git.kernel.org/stable/c/d5f490343c77e6708b6c4aa7dbbfbcbb9546adea
https://git.kernel.org/stable/c/d5f490343c77e6708b6c4aa7dbbfbcbb9546adea
https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html
https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html

Weakness Enumeration

CWE-ID CWE Name Source

Change History

6 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2023-52679
NVD Published Date:
05/17/2024
NVD Last Modified:
11/21/2024
Source:
kernel.org