CVE-2023-52475

In the Linux kernel, the following vulnerability has been resolved: Input: powermate - fix use-after-free in powermate_config_complete syzbot has found a use-after-free bug [1] in the powermate driver. This happens when the device is disconnected, which leads to a memory free from the powermate_device struct. When an asynchronous control message completes after the kfree and its callback is invoked, the lock does not exist anymore and hence the bug. Use usb_kill_urb() on pm->config to cancel any in-progress requests upon device disconnection. [1] https://syzkaller.appspot.com/bug?extid=0434ac83f907a1dbdd1e
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc5:*:*:*:*:*:*

History

09 Dec 2024, 18:47

Type Values Removed Values Added
First Time Linux linux Kernel
Linux
References () https://git.kernel.org/stable/c/2efe67c581a2a6122b328d4bb6f21b3f36f40d46 - () https://git.kernel.org/stable/c/2efe67c581a2a6122b328d4bb6f21b3f36f40d46 - Patch
References () https://git.kernel.org/stable/c/5aa514100aaf59868d745196258269a16737c7bd - () https://git.kernel.org/stable/c/5aa514100aaf59868d745196258269a16737c7bd - Patch
References () https://git.kernel.org/stable/c/5c15c60e7be615f05a45cd905093a54b11f461bc - () https://git.kernel.org/stable/c/5c15c60e7be615f05a45cd905093a54b11f461bc - Patch
References () https://git.kernel.org/stable/c/67cace72606baf1758fd60feb358f4c6be92e1cc - () https://git.kernel.org/stable/c/67cace72606baf1758fd60feb358f4c6be92e1cc - Patch
References () https://git.kernel.org/stable/c/6a4a396386404e62fb59bc3bde48871a64a82b4f - () https://git.kernel.org/stable/c/6a4a396386404e62fb59bc3bde48871a64a82b4f - Patch
References () https://git.kernel.org/stable/c/8677575c4f39d65bf0d719b5d20e8042e550ccb9 - () https://git.kernel.org/stable/c/8677575c4f39d65bf0d719b5d20e8042e550ccb9 - Patch
References () https://git.kernel.org/stable/c/cd2fbfd8b922b7fdd50732e47d797754ab59cb06 - () https://git.kernel.org/stable/c/cd2fbfd8b922b7fdd50732e47d797754ab59cb06 - Patch
References () https://git.kernel.org/stable/c/e528b1b9d60743e0b26224e3fe7aa74c24b8b2f8 - () https://git.kernel.org/stable/c/e528b1b9d60743e0b26224e3fe7aa74c24b8b2f8 - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CWE CWE-416
CPE cpe:2.3:o:linux:linux_kernel:6.6:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Information

Published : 2024-02-29 06:15

Updated : 2024-12-09 18:47


NVD link : CVE-2023-52475

Mitre link : CVE-2023-52475

CVE.ORG link : CVE-2023-52475


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free