Skip to main content

CVE-2023-52691: Vulnerability in Linux Linux

High
VulnerabilityCVE-2023-52691cvecve-2023-52691
Published: Fri May 17 2024 (05/17/2024, 14:24:51 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: drm/amd/pm: fix a double-free in si_dpm_init When the allocation of adev->pm.dpm.dyn_state.vddc_dependency_on_dispclk.entries fails, amdgpu_free_extended_power_table is called to free some fields of adev. However, when the control flow returns to si_dpm_sw_init, it goes to label dpm_failed and calls si_dpm_fini, which calls amdgpu_free_extended_power_table again and free those fields again. Thus a double-free is triggered.

AI-Powered Analysis

AILast updated: 07/01/2025, 05:57:08 UTC

Technical Analysis

CVE-2023-52691 is a vulnerability identified in the Linux kernel specifically within the AMD GPU driver code (drm/amd/pm). The issue arises from a double-free condition during the initialization of the power management dynamic power management (DPM) state for Southern Islands (SI) GPUs. When the allocation of the dynamic voltage dependency table (adev->pm.dpm.dyn_state.vddc_dependency_on_dispclk.entries) fails, the function amdgpu_free_extended_power_table is called to free certain fields of the AMD GPU device structure (adev). However, the control flow subsequently returns to the si_dpm_sw_init function, which jumps to an error handling label (dpm_failed) that calls si_dpm_fini. This function again calls amdgpu_free_extended_power_table, causing the same fields to be freed a second time. This double-free can lead to memory corruption, potentially resulting in kernel crashes (denial of service) or exploitable conditions that could allow privilege escalation or arbitrary code execution within the kernel context. The vulnerability affects specific Linux kernel versions containing the referenced commit hash (841686df9f7d2942cfd94d024b8591fa3f74ef7c). No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The flaw is rooted in improper error handling and resource management in the AMD GPU power management driver code.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to systems running Linux kernels with AMD GPU drivers, especially those using Southern Islands generation GPUs or similar hardware affected by this driver code. The impact includes potential system instability due to kernel crashes, which can disrupt critical services and operations. More severely, if exploited, attackers could gain elevated privileges or execute arbitrary code at the kernel level, compromising system confidentiality, integrity, and availability. This is particularly concerning for data centers, cloud providers, and enterprises relying on Linux servers with AMD GPUs for compute workloads, graphics processing, or virtualization. Industrial control systems or embedded devices running vulnerable Linux kernels could also be impacted. Although no exploits are currently known, the presence of a double-free vulnerability in kernel space is a significant security risk that could be weaponized by attackers to bypass security controls and gain persistent access.

Mitigation Recommendations

Organizations should promptly apply the official Linux kernel patches that address CVE-2023-52691 once available from trusted sources such as the Linux kernel mailing list or their Linux distribution vendors. Until patched, it is advisable to audit and monitor systems with AMD GPUs for unusual kernel crashes or suspicious activity. Disabling or limiting the use of affected AMD GPU drivers in non-critical environments can reduce exposure. Employ kernel hardening techniques such as Kernel Address Space Layout Randomization (KASLR), Kernel Page Table Isolation (KPTI), and memory corruption mitigations (e.g., SLAB freelist hardening) to reduce exploitation likelihood. For environments where patching is delayed, consider isolating vulnerable systems from untrusted networks and enforcing strict access controls. Regularly update and maintain system firmware and drivers to ensure compatibility with security patches. Finally, conduct thorough testing of kernel updates in staging environments to prevent operational disruptions.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-03-07T14:49:46.888Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9830c4522896dcbe732f

Added to database: 5/21/2025, 9:09:04 AM

Last enriched: 7/1/2025, 5:57:08 AM

Last updated: 8/6/2025, 8:35:03 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats