CVE-2023-52907

In the Linux kernel, the following vulnerability has been resolved: nfc: pn533: Wait for out_urb's completion in pn533_usb_send_frame() Fix a use-after-free that occurs in hcd when in_urb sent from pn533_usb_send_frame() is completed earlier than out_urb. Its callback frees the skb data in pn533_send_async_complete() that is used as a transfer buffer of out_urb. Wait before sending in_urb until the callback of out_urb is called. To modify the callback of out_urb alone, separate the complete function of out_urb and ack_urb. Found by a modified version of syzkaller. BUG: KASAN: use-after-free in dummy_timer Call Trace: memcpy (mm/kasan/shadow.c:65) dummy_perform_transfer (drivers/usb/gadget/udc/dummy_hcd.c:1352) transfer (drivers/usb/gadget/udc/dummy_hcd.c:1453) dummy_timer (drivers/usb/gadget/udc/dummy_hcd.c:1972) arch_static_branch (arch/x86/include/asm/jump_label.h:27) static_key_false (include/linux/jump_label.h:207) timer_expire_exit (include/trace/events/timer.h:127) call_timer_fn (kernel/time/timer.c:1475) expire_timers (kernel/time/timer.c:1519) __run_timers (kernel/time/timer.c:1790) run_timer_softirq (kernel/time/timer.c:1803)
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*

History

12 Sep 2024, 16:06

Type Values Removed Values Added
CWE CWE-416
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/0ca78c99656f5c448567db1e148367aa3b01c80a - () https://git.kernel.org/stable/c/0ca78c99656f5c448567db1e148367aa3b01c80a - Patch
References () https://git.kernel.org/stable/c/321db5131c92983dac4f3338e8fbb6df214238c0 - () https://git.kernel.org/stable/c/321db5131c92983dac4f3338e8fbb6df214238c0 - Patch
References () https://git.kernel.org/stable/c/35529d6b827eedb6bf7e81130e4b7e0aba9e58d2 - () https://git.kernel.org/stable/c/35529d6b827eedb6bf7e81130e4b7e0aba9e58d2 - Patch
References () https://git.kernel.org/stable/c/39ae73e581112cfe27ba50aecb1c891ce57cecb1 - () https://git.kernel.org/stable/c/39ae73e581112cfe27ba50aecb1c891ce57cecb1 - Patch
References () https://git.kernel.org/stable/c/8998db5021a28ad67aa8d627bdb4226e4046ccc4 - () https://git.kernel.org/stable/c/8998db5021a28ad67aa8d627bdb4226e4046ccc4 - Patch
References () https://git.kernel.org/stable/c/9424d2205fe94a095fb9365ec0c6137f0b394a2b - () https://git.kernel.org/stable/c/9424d2205fe94a095fb9365ec0c6137f0b394a2b - Patch
References () https://git.kernel.org/stable/c/9dab880d675b9d0dd56c6428e4e8352a3339371d - () https://git.kernel.org/stable/c/9dab880d675b9d0dd56c6428e4e8352a3339371d - Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*
First Time Linux linux Kernel
Linux

21 Aug 2024, 12:30

Type Values Removed Values Added
New CVE

Information

Published : 2024-08-21 07:15

Updated : 2024-09-12 16:06


NVD link : CVE-2023-52907

Mitre link : CVE-2023-52907

CVE.ORG link : CVE-2023-52907


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free