Lucene search

K
cveLinuxCVE-2023-52907
HistoryAug 21, 2024 - 7:15 a.m.

CVE-2023-52907

2024-08-2107:15:06
CWE-416
Linux
web.nvd.nist.gov
30
linux kernel
use-after-free vulnerability
nfc pn533
syzkaller

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

AI Score

6.8

Confidence

Low

EPSS

0

Percentile

5.1%

In the Linux kernel, the following vulnerability has been resolved:

nfc: pn533: Wait for out_urb’s completion in pn533_usb_send_frame()

Fix a use-after-free that occurs in hcd when in_urb sent from
pn533_usb_send_frame() is completed earlier than out_urb. Its callback
frees the skb data in pn533_send_async_complete() that is used as a
transfer buffer of out_urb. Wait before sending in_urb until the
callback of out_urb is called. To modify the callback of out_urb alone,
separate the complete function of out_urb and ack_urb.

Found by a modified version of syzkaller.

BUG: KASAN: use-after-free in dummy_timer
Call Trace:
memcpy (mm/kasan/shadow.c:65)
dummy_perform_transfer (drivers/usb/gadget/udc/dummy_hcd.c:1352)
transfer (drivers/usb/gadget/udc/dummy_hcd.c:1453)
dummy_timer (drivers/usb/gadget/udc/dummy_hcd.c:1972)
arch_static_branch (arch/x86/include/asm/jump_label.h:27)
static_key_false (include/linux/jump_label.h:207)
timer_expire_exit (include/trace/events/timer.h:127)
call_timer_fn (kernel/time/timer.c:1475)
expire_timers (kernel/time/timer.c:1519)
__run_timers (kernel/time/timer.c:1790)
run_timer_softirq (kernel/time/timer.c:1803)

Affected configurations

Nvd
Vulners
Node
linuxlinux_kernelRange3.14.14.303
OR
linuxlinux_kernelRange4.154.19.270
OR
linuxlinux_kernelRange4.205.4.229
OR
linuxlinux_kernelRange5.55.10.164
OR
linuxlinux_kernelRange5.115.15.89
OR
linuxlinux_kernelRange5.166.1.7
OR
linuxlinux_kernelMatch6.2rc1
OR
linuxlinux_kernelMatch6.2rc2
OR
linuxlinux_kernelMatch6.2rc3
VendorProductVersionCPE
linuxlinux_kernel*cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
linuxlinux_kernel6.2cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*
linuxlinux_kernel6.2cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*
linuxlinux_kernel6.2cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "Linux",
    "vendor": "Linux",
    "defaultStatus": "unaffected",
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "programFiles": [
      "drivers/nfc/pn533/usb.c"
    ],
    "versions": [
      {
        "version": "c46ee38620a2",
        "lessThan": "35529d6b827e",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "c46ee38620a2",
        "lessThan": "321db5131c92",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "c46ee38620a2",
        "lessThan": "9424d2205fe9",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "c46ee38620a2",
        "lessThan": "0ca78c99656f",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "c46ee38620a2",
        "lessThan": "39ae73e58111",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "c46ee38620a2",
        "lessThan": "8998db5021a2",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "c46ee38620a2",
        "lessThan": "9dab880d675b",
        "status": "affected",
        "versionType": "git"
      }
    ]
  },
  {
    "product": "Linux",
    "vendor": "Linux",
    "defaultStatus": "affected",
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "programFiles": [
      "drivers/nfc/pn533/usb.c"
    ],
    "versions": [
      {
        "version": "3.1",
        "status": "affected"
      },
      {
        "version": "0",
        "lessThan": "3.1",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "4.14.303",
        "lessThanOrEqual": "4.14.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "4.19.270",
        "lessThanOrEqual": "4.19.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.4.229",
        "lessThanOrEqual": "5.4.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.10.164",
        "lessThanOrEqual": "5.10.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.15.89",
        "lessThanOrEqual": "5.15.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.1.7",
        "lessThanOrEqual": "6.1.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.2",
        "lessThanOrEqual": "*",
        "status": "unaffected",
        "versionType": "original_commit_for_fix"
      }
    ]
  }
]

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

AI Score

6.8

Confidence

Low

EPSS

0

Percentile

5.1%