CVE-2023-52691: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: drm/amd/pm: fix a double-free in si_dpm_init When the allocation of adev->pm.dpm.dyn_state.vddc_dependency_on_dispclk.entries fails, amdgpu_free_extended_power_table is called to free some fields of adev. However, when the control flow returns to si_dpm_sw_init, it goes to label dpm_failed and calls si_dpm_fini, which calls amdgpu_free_extended_power_table again and free those fields again. Thus a double-free is triggered.
AI Analysis
Technical Summary
CVE-2023-52691 is a vulnerability identified in the Linux kernel specifically within the AMD GPU driver code (drm/amd/pm). The issue arises from a double-free condition during the initialization of the power management dynamic power management (DPM) state for Southern Islands (SI) GPUs. When the allocation of the dynamic voltage dependency table (adev->pm.dpm.dyn_state.vddc_dependency_on_dispclk.entries) fails, the function amdgpu_free_extended_power_table is called to free certain fields of the AMD GPU device structure (adev). However, the control flow subsequently returns to the si_dpm_sw_init function, which jumps to an error handling label (dpm_failed) that calls si_dpm_fini. This function again calls amdgpu_free_extended_power_table, causing the same fields to be freed a second time. This double-free can lead to memory corruption, potentially resulting in kernel crashes (denial of service) or exploitable conditions that could allow privilege escalation or arbitrary code execution within the kernel context. The vulnerability affects specific Linux kernel versions containing the referenced commit hash (841686df9f7d2942cfd94d024b8591fa3f74ef7c). No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The flaw is rooted in improper error handling and resource management in the AMD GPU power management driver code.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running Linux kernels with AMD GPU drivers, especially those using Southern Islands generation GPUs or similar hardware affected by this driver code. The impact includes potential system instability due to kernel crashes, which can disrupt critical services and operations. More severely, if exploited, attackers could gain elevated privileges or execute arbitrary code at the kernel level, compromising system confidentiality, integrity, and availability. This is particularly concerning for data centers, cloud providers, and enterprises relying on Linux servers with AMD GPUs for compute workloads, graphics processing, or virtualization. Industrial control systems or embedded devices running vulnerable Linux kernels could also be impacted. Although no exploits are currently known, the presence of a double-free vulnerability in kernel space is a significant security risk that could be weaponized by attackers to bypass security controls and gain persistent access.
Mitigation Recommendations
Organizations should promptly apply the official Linux kernel patches that address CVE-2023-52691 once available from trusted sources such as the Linux kernel mailing list or their Linux distribution vendors. Until patched, it is advisable to audit and monitor systems with AMD GPUs for unusual kernel crashes or suspicious activity. Disabling or limiting the use of affected AMD GPU drivers in non-critical environments can reduce exposure. Employ kernel hardening techniques such as Kernel Address Space Layout Randomization (KASLR), Kernel Page Table Isolation (KPTI), and memory corruption mitigations (e.g., SLAB freelist hardening) to reduce exploitation likelihood. For environments where patching is delayed, consider isolating vulnerable systems from untrusted networks and enforcing strict access controls. Regularly update and maintain system firmware and drivers to ensure compatibility with security patches. Finally, conduct thorough testing of kernel updates in staging environments to prevent operational disruptions.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Poland, Italy, Spain
CVE-2023-52691: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: drm/amd/pm: fix a double-free in si_dpm_init When the allocation of adev->pm.dpm.dyn_state.vddc_dependency_on_dispclk.entries fails, amdgpu_free_extended_power_table is called to free some fields of adev. However, when the control flow returns to si_dpm_sw_init, it goes to label dpm_failed and calls si_dpm_fini, which calls amdgpu_free_extended_power_table again and free those fields again. Thus a double-free is triggered.
AI-Powered Analysis
Technical Analysis
CVE-2023-52691 is a vulnerability identified in the Linux kernel specifically within the AMD GPU driver code (drm/amd/pm). The issue arises from a double-free condition during the initialization of the power management dynamic power management (DPM) state for Southern Islands (SI) GPUs. When the allocation of the dynamic voltage dependency table (adev->pm.dpm.dyn_state.vddc_dependency_on_dispclk.entries) fails, the function amdgpu_free_extended_power_table is called to free certain fields of the AMD GPU device structure (adev). However, the control flow subsequently returns to the si_dpm_sw_init function, which jumps to an error handling label (dpm_failed) that calls si_dpm_fini. This function again calls amdgpu_free_extended_power_table, causing the same fields to be freed a second time. This double-free can lead to memory corruption, potentially resulting in kernel crashes (denial of service) or exploitable conditions that could allow privilege escalation or arbitrary code execution within the kernel context. The vulnerability affects specific Linux kernel versions containing the referenced commit hash (841686df9f7d2942cfd94d024b8591fa3f74ef7c). No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The flaw is rooted in improper error handling and resource management in the AMD GPU power management driver code.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running Linux kernels with AMD GPU drivers, especially those using Southern Islands generation GPUs or similar hardware affected by this driver code. The impact includes potential system instability due to kernel crashes, which can disrupt critical services and operations. More severely, if exploited, attackers could gain elevated privileges or execute arbitrary code at the kernel level, compromising system confidentiality, integrity, and availability. This is particularly concerning for data centers, cloud providers, and enterprises relying on Linux servers with AMD GPUs for compute workloads, graphics processing, or virtualization. Industrial control systems or embedded devices running vulnerable Linux kernels could also be impacted. Although no exploits are currently known, the presence of a double-free vulnerability in kernel space is a significant security risk that could be weaponized by attackers to bypass security controls and gain persistent access.
Mitigation Recommendations
Organizations should promptly apply the official Linux kernel patches that address CVE-2023-52691 once available from trusted sources such as the Linux kernel mailing list or their Linux distribution vendors. Until patched, it is advisable to audit and monitor systems with AMD GPUs for unusual kernel crashes or suspicious activity. Disabling or limiting the use of affected AMD GPU drivers in non-critical environments can reduce exposure. Employ kernel hardening techniques such as Kernel Address Space Layout Randomization (KASLR), Kernel Page Table Isolation (KPTI), and memory corruption mitigations (e.g., SLAB freelist hardening) to reduce exploitation likelihood. For environments where patching is delayed, consider isolating vulnerable systems from untrusted networks and enforcing strict access controls. Regularly update and maintain system firmware and drivers to ensure compatibility with security patches. Finally, conduct thorough testing of kernel updates in staging environments to prevent operational disruptions.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-03-07T14:49:46.888Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9830c4522896dcbe732f
Added to database: 5/21/2025, 9:09:04 AM
Last enriched: 7/1/2025, 5:57:08 AM
Last updated: 8/6/2025, 8:35:03 PM
Views: 15
Related Threats
CVE-2025-8959: CWE-59: Improper Link Resolution Before File Access (Link Following) in HashiCorp Shared library
HighCVE-2025-44201
LowCVE-2025-36088: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in IBM Storage TS4500 Library
MediumCVE-2025-43490: CWE-59 Improper Link Resolution Before File Access ('Link Following') in HP, Inc. HP Hotkey Support Software
MediumCVE-2025-9060: CWE-20 Improper Input Validation in MSoft MFlash
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.