CVE-2023-52457

Severity CVSS v4.0:
Pending analysis
Type:
CWE-416 Use After Free
Publication date:
23/02/2024
Last modified:
04/11/2024

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> serial: 8250: omap: Don&amp;#39;t skip resource freeing if pm_runtime_resume_and_get() failed<br /> <br /> Returning an error code from .remove() makes the driver core emit the<br /> little helpful error message:<br /> <br /> remove callback returned a non-zero value. This will be ignored.<br /> <br /> and then remove the device anyhow. So all resources that were not freed<br /> are leaked in this case. Skipping serial8250_unregister_port() has the<br /> potential to keep enough of the UART around to trigger a use-after-free.<br /> <br /> So replace the error return (and with it the little helpful error<br /> message) by a more useful error message and continue to cleanup.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.4.225 (including) 5.4.268 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.10.156 (including) 5.10.209 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.15.80 (including) 5.15.148 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.0.10 (including) 6.1.75 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.14 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.7.2 (excluding)