Executive Summary

Informations
Name CVE-2023-52457 First vendor Publication 2024-02-23
Vendor Cve Last vendor Modification 2024-08-27

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Overall CVSS Score 7.8
Base Score 7.8 Environmental Score 7.8
impact SubScore 5.9 Temporal Score 7.8
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact High
Integrity Impact High Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed

Returning an error code from .remove() makes the driver core emit the little helpful error message:

remove callback returned a non-zero value. This will be ignored.

and then remove the device anyhow. So all resources that were not freed are leaked in this case. Skipping serial8250_unregister_port() has the potential to keep enough of the UART around to trigger a use-after-free.

So replace the error return (and with it the little helpful error message) by a more useful error message and continue to cleanup.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52457

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-416 Use After Free

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8
Os 3587

Sources (Detail)

https://git.kernel.org/stable/c/828cd829483f0cda920710997aed79130b0af690
https://git.kernel.org/stable/c/887a558d0298d36297daea039954c39940228d9b
https://git.kernel.org/stable/c/95e4e0031effad9837af557ecbfd4294a4d8aeee
https://git.kernel.org/stable/c/ad90d0358bd3b4554f243a425168fc7cebe7d04e
https://git.kernel.org/stable/c/b502fb43f7fb55aaf07f6092ab44657595214b93
https://git.kernel.org/stable/c/bc57f3ef8a9eb0180606696f586a6dcfaa175ed0
https://git.kernel.org/stable/c/d74173bda29aba58f822175d983d07c8ed335494
https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
Date Informations
2024-10-26 02:52:43
  • Multiple Updates
2024-10-25 02:54:40
  • Multiple Updates
2024-10-23 02:53:57
  • Multiple Updates
2024-10-03 02:49:35
  • Multiple Updates
2024-10-02 02:47:58
  • Multiple Updates
2024-09-15 02:45:59
  • Multiple Updates
2024-09-12 02:45:31
  • Multiple Updates
2024-09-03 21:28:14
  • Multiple Updates
2024-08-27 21:28:41
  • Multiple Updates
2024-08-22 02:45:11
  • Multiple Updates
2024-08-02 13:54:10
  • Multiple Updates
2024-08-02 01:34:33
  • Multiple Updates
2024-06-26 00:27:30
  • Multiple Updates
2024-05-01 00:27:30
  • Multiple Updates
2024-02-23 21:27:25
  • First insertion