CVE-2023-52492 — NULL Pointer Dereference in Linux
Severity
4.4MEDIUMNVD
OSV7.5OSV6.5
EPSS
0.0%
top 99.60%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 11
Latest updateJun 26
Description
In the Linux kernel, the following vulnerability has been resolved:
dmaengine: fix NULL pointer in channel unregistration function
__dma_async_device_channel_register() can fail. In case of failure,
chan->local is freed (with free_percpu()), and chan->local is nullified.
When dma_async_device_unregister() is called (because of managed API or
intentionally by DMA controller driver), channels are unconditionally
unregistered, leading to this NULL pointer:
[ 1.318693] Unable to handle kernel NULL…
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:HExploitability: 0.8 | Impact: 3.6
Affected Packages5 packages
▶CVEListV5linux/linuxd2fb0a0438384fee08a418025f743913020033ce — 9de69732dde4e443c1c7f89acbbed2c45a6a8e17+6
Also affects: Debian Linux 10.0
Patches
🔴Vulnerability Details
16📋Vendor Advisories
15💬Community
1Bugzilla
▶