Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-53708

Опубликовано: 22 окт. 2025
Источник: redhat
CVSS3: 4
EPSS Низкий

Описание

In the Linux kernel, the following vulnerability has been resolved: ACPI: x86: s2idle: Catch multiple ACPI_TYPE_PACKAGE objects If a badly constructed firmware includes multiple ACPI_TYPE_PACKAGE objects while evaluating the AMD LPS0 _DSM, there will be a memory leak. Explicitly guard against this.

A memory leak was found in the Linux kernel's ACPI x86 suspend-to-idle implementation in the AMD Low Power S0 (LPS0) DSM evaluation code. A system with malformed ACPI firmware that returns multiple ACPI_TYPE_PACKAGE objects during _DSM evaluation can trigger repeated memory allocations that are never freed. This leads to gradual memory exhaustion and potential denial of service.

Отчет

The AMD LPS0 DSM handler expects a single package object but doesn't guard against firmware returning multiples. Each extra package leaks memory.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10kernelNot affected
Red Hat Enterprise Linux 6kernelNot affected
Red Hat Enterprise Linux 7kernelNot affected
Red Hat Enterprise Linux 7kernel-rtNot affected
Red Hat Enterprise Linux 8kernelFix deferred
Red Hat Enterprise Linux 8kernel-rtFix deferred
Red Hat Enterprise Linux 9kernel-rtFix deferred
Red Hat Enterprise Linux 9kernelFixedRHSA-2024:931512.11.2024
Red Hat Enterprise Linux 9kernelFixedRHSA-2024:931512.11.2024

Показывать по

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=2405783kernel: ACPI: x86: s2idle: Catch multiple ACPI_TYPE_PACKAGE objects

EPSS

Процентиль: 8%
0.00028
Низкий

4 Medium

CVSS3

Связанные уязвимости

ubuntu
6 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: ACPI: x86: s2idle: Catch multiple ACPI_TYPE_PACKAGE objects If a badly constructed firmware includes multiple `ACPI_TYPE_PACKAGE` objects while evaluating the AMD LPS0 _DSM, there will be a memory leak. Explicitly guard against this.

nvd
6 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: ACPI: x86: s2idle: Catch multiple ACPI_TYPE_PACKAGE objects If a badly constructed firmware includes multiple `ACPI_TYPE_PACKAGE` objects while evaluating the AMD LPS0 _DSM, there will be a memory leak. Explicitly guard against this.

debian
6 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: A ...

github
6 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: ACPI: x86: s2idle: Catch multiple ACPI_TYPE_PACKAGE objects If a badly constructed firmware includes multiple `ACPI_TYPE_PACKAGE` objects while evaluating the AMD LPS0 _DSM, there will be a memory leak. Explicitly guard against this.

CVSS3: 5.5
fstec
больше 2 лет назад

Уязвимость функции lpi_device_get_constraints_amd() модуля drivers/acpi/x86/s2idle.c драйвера ACPI (расширенный интерфейс конфигурации и питания) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 8%
0.00028
Низкий

4 Medium

CVSS3