CVE-2023-52475

In the Linux kernel, the following vulnerability has been resolved: Input: powermate - fix use-after-free in powermate_config_complete syzbot has found a use-after-free bug [1] in the powermate driver. This happens when the device is disconnected, which leads to a memory free from the powermate_device struct. When an asynchronous control message completes after the kfree and its callback is invoked, the lock does not exist anymore and hence the bug. Use usb_kill_urb() on pm->config to cancel any in-progress requests upon device disconnection. [1] https://syzkaller.appspot.com/bug?extid=0434ac83f907a1dbdd1e
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc5:*:*:*:*:*:*

History

09 Dec 2024, 18:47

Type Values Removed Values Added
First Time Linux linux Kernel
Linux
References () https://git.kernel.org/stable/c/2efe67c581a2a6122b328d4bb6f21b3f36f40d46 - () https://git.kernel.org/stable/c/2efe67c581a2a6122b328d4bb6f21b3f36f40d46 - Patch
References () https://git.kernel.org/stable/c/5aa514100aaf59868d745196258269a16737c7bd - () https://git.kernel.org/stable/c/5aa514100aaf59868d745196258269a16737c7bd - Patch
References () https://git.kernel.org/stable/c/5c15c60e7be615f05a45cd905093a54b11f461bc - () https://git.kernel.org/stable/c/5c15c60e7be615f05a45cd905093a54b11f461bc - Patch
References () https://git.kernel.org/stable/c/67cace72606baf1758fd60feb358f4c6be92e1cc - () https://git.kernel.org/stable/c/67cace72606baf1758fd60feb358f4c6be92e1cc - Patch
References () https://git.kernel.org/stable/c/6a4a396386404e62fb59bc3bde48871a64a82b4f - () https://git.kernel.org/stable/c/6a4a396386404e62fb59bc3bde48871a64a82b4f - Patch
References () https://git.kernel.org/stable/c/8677575c4f39d65bf0d719b5d20e8042e550ccb9 - () https://git.kernel.org/stable/c/8677575c4f39d65bf0d719b5d20e8042e550ccb9 - Patch
References () https://git.kernel.org/stable/c/cd2fbfd8b922b7fdd50732e47d797754ab59cb06 - () https://git.kernel.org/stable/c/cd2fbfd8b922b7fdd50732e47d797754ab59cb06 - Patch
References () https://git.kernel.org/stable/c/e528b1b9d60743e0b26224e3fe7aa74c24b8b2f8 - () https://git.kernel.org/stable/c/e528b1b9d60743e0b26224e3fe7aa74c24b8b2f8 - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc3:*:*:*:*:*:*
CWE CWE-416

21 Nov 2024, 08:39

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/2efe67c581a2a6122b328d4bb6f21b3f36f40d46 - () https://git.kernel.org/stable/c/2efe67c581a2a6122b328d4bb6f21b3f36f40d46 -
References () https://git.kernel.org/stable/c/5aa514100aaf59868d745196258269a16737c7bd - () https://git.kernel.org/stable/c/5aa514100aaf59868d745196258269a16737c7bd -
References () https://git.kernel.org/stable/c/5c15c60e7be615f05a45cd905093a54b11f461bc - () https://git.kernel.org/stable/c/5c15c60e7be615f05a45cd905093a54b11f461bc -
References () https://git.kernel.org/stable/c/67cace72606baf1758fd60feb358f4c6be92e1cc - () https://git.kernel.org/stable/c/67cace72606baf1758fd60feb358f4c6be92e1cc -
References () https://git.kernel.org/stable/c/6a4a396386404e62fb59bc3bde48871a64a82b4f - () https://git.kernel.org/stable/c/6a4a396386404e62fb59bc3bde48871a64a82b4f -
References () https://git.kernel.org/stable/c/8677575c4f39d65bf0d719b5d20e8042e550ccb9 - () https://git.kernel.org/stable/c/8677575c4f39d65bf0d719b5d20e8042e550ccb9 -
References () https://git.kernel.org/stable/c/cd2fbfd8b922b7fdd50732e47d797754ab59cb06 - () https://git.kernel.org/stable/c/cd2fbfd8b922b7fdd50732e47d797754ab59cb06 -
References () https://git.kernel.org/stable/c/e528b1b9d60743e0b26224e3fe7aa74c24b8b2f8 - () https://git.kernel.org/stable/c/e528b1b9d60743e0b26224e3fe7aa74c24b8b2f8 -
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: Entrada: powermate - corrige el use-after-free en powermate_config_complete syzbot ha encontrado un error de use-after-free [1] en el controlador powermate. Esto sucede cuando el dispositivo está desconectado, lo que genera una memoria libre de la estructura powermate_device. Cuando se completa un mensaje de control asincrónico después de que se invoca kfree y su devolución de llamada, el bloqueo ya no existe y de ahí el error. Utilice usb_kill_urb() en pm->config para cancelar cualquier solicitud en curso al desconectar el dispositivo. [1] https://syzkaller.appspot.com/bug?extid=0434ac83f907a1dbdd1e

29 Feb 2024, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-29 06:15

Updated : 2024-12-09 18:47


NVD link : CVE-2023-52475

Mitre link : CVE-2023-52475

CVE.ORG link : CVE-2023-52475


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free