Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-52457
HistoryFeb 23, 2024 - 12:00 a.m.

CVE-2023-52457

2024-02-2300:00:00
ubuntu.com
ubuntu.com
3
linux kernel
vulnerability
cve-2023-52457
serial
8250
omap
resource freeing
pm_runtime_resume_and_get
driver core
use-after-free
uart

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.4 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%

In the Linux kernel, the following vulnerability has been resolved: serial:
8250: omap: Don’t skip resource freeing if pm_runtime_resume_and_get()
failed Returning an error code from .remove() makes the driver core emit
the little helpful error message: remove callback returned a non-zero
value. This will be ignored. and then remove the device anyhow. So all
resources that were not freed are leaked in this case. Skipping
serial8250_unregister_port() has the potential to keep enough of the UART
around to trigger a use-after-free. So replace the error return (and with
it the little helpful error message) by a more useful error message and
continue to cleanup.

Notes

Author Note
rodrigo-zaiden USN-6765-1 for linux-oem-6.5 wrongly stated that this CVE was fixed in version 6.5.0-1022.23. The mentioned notice was revoked and the state of the fix for linux-oem-6.5 was recovered to the previous state.
Rows per page:
1-10 of 781

References

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.4 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%