In the Linux kernel, the following vulnerability has been resolved:
x86/mm, kexec, ima: Use memblock_free_late() from ima_free_kexec_buffer()
The code calling ima_free_kexec_buffer() runs long after the memblock
allocator has already been torn down, potentially resulting in a use
after free in memblock_isolate_range().
With KASAN or KFENCE, this use after free will result in a BUG
from the idle task, and a subsequent kernel panic.
Switch ima_free_kexec_buffer() over to memblock_free_late() to avoid
that bug.
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2024-03-02 22:15
Updated : 2025-04-08 15:04
NVD link : CVE-2023-52576
Mitre link : CVE-2023-52576
CVE.ORG link : CVE-2023-52576
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free
