First published: Thu Feb 22 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: media: pvrusb2: fix use after free on context disconnection Upon module load, a kthread is created targeting the pvr2_context_thread_func function, which may call pvr2_context_destroy and thus call kfree() on the context object. However, that might happen before the usb hub_event handler is able to notify the driver. This patch adds a sanity check before the invalid read reported by syzbot, within the context disconnection call stack.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <4.19.306 | |
Linux Kernel | >=4.20<5.4.268 | |
Linux Kernel | >=5.5.0<5.10.209 | |
Linux Kernel | >=5.11.0<5.15.148 | |
Linux Kernel | >=5.16.0<6.1.75 | |
Linux Kernel | >=6.2.0<6.6.14 | |
Linux Kernel | >=6.7.0<6.7.2 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.119-1 6.12.10-1 6.12.11-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-52445 is classified as a high-severity vulnerability in the Linux kernel.
To fix CVE-2023-52445, update to the patched version of the Linux kernel, such as 5.10.223-1 or later.
CVE-2023-52445 affects Linux kernel versions prior to 4.19.306, between 4.20 and 5.4.268, between 5.5.0 and 5.10.209, between 5.11.0 and 5.15.148, between 5.16.0 and 6.1.75, between 6.2.0 and 6.6.14, and between 6.7.0 and 6.7.2.
CVE-2023-52445 is a use-after-free vulnerability that occurs during context disconnection in the pvrusb2 driver.
As of now, there is no public exploit available for CVE-2023-52445, but it is advisable to apply patches to mitigate any risk.