2024-02-23 17:01:16 +00:00
{
"id" : "CVE-2023-52457" ,
"sourceIdentifier" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67" ,
"published" : "2024-02-23T15:15:08.290" ,
2024-12-08 03:06:42 +00:00
"lastModified" : "2024-11-21T08:39:48.777" ,
2024-11-04 15:03:20 +00:00
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2024-02-23 17:01:16 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nserial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed\n\nReturning an error code from .remove() makes the driver core emit the\nlittle helpful error message:\n\n\tremove callback returned a non-zero value. This will be ignored.\n\nand then remove the device anyhow. So all resources that were not freed\nare leaked in this case. Skipping serial8250_unregister_port() has the\npotential to keep enough of the UART around to trigger a use-after-free.\n\nSo replace the error return (and with it the little helpful error\nmessage) by a more useful error message and continue to cleanup."
2024-04-04 08:46:00 +00:00
} ,
{
"lang" : "es" ,
"value" : "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: serial: 8250: omap: no omita la liberaci\u00f3n de recursos si pm_runtime_resume_and_get() falla. Devolver un c\u00f3digo de error desde .remove() hace que el n\u00facleo del controlador emita el peque\u00f1o y \u00fatil mensaje de error: eliminar la devoluci\u00f3n de llamada devolvi\u00f3 un valor distinto de cero. Esto ser\u00e1 ignorado. y luego retire el dispositivo de todos modos. Entonces, en este caso, todos los recursos que no fueron liberados se filtran. Omitir serial8250_unregister_port() tiene el potencial de mantener suficiente UART disponible para desencadenar un use-after-free. As\u00ed que reemplace el retorno de error (y con \u00e9l el peque\u00f1o mensaje de error \u00fatil) por un mensaje de error m\u00e1s \u00fatil y contin\u00fae con la limpieza."
2024-02-23 17:01:16 +00:00
}
] ,
2024-04-30 20:03:28 +00:00
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 7.8 ,
"baseSeverity" : "HIGH" ,
2024-04-30 20:03:28 +00:00
"attackVector" : "LOCAL" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2024-04-30 20:03:28 +00:00
} ,
"exploitabilityScore" : 1.8 ,
"impactScore" : 5.9
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-416"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ,
2024-08-27 16:03:16 +00:00
"versionStartIncluding" : "5.4.225" ,
2024-04-30 20:03:28 +00:00
"versionEndExcluding" : "5.4.268" ,
2024-08-27 16:03:16 +00:00
"matchCriteriaId" : "FC047956-45DC-4BAB-85FD-030B6A3099E6"
2024-04-30 20:03:28 +00:00
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ,
2024-08-27 16:03:16 +00:00
"versionStartIncluding" : "5.10.156" ,
2024-04-30 20:03:28 +00:00
"versionEndExcluding" : "5.10.209" ,
2024-08-27 16:03:16 +00:00
"matchCriteriaId" : "C1E2138B-797C-4020-BF46-CA24B8E1AEA9"
2024-04-30 20:03:28 +00:00
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ,
2024-08-27 16:03:16 +00:00
"versionStartIncluding" : "5.15.80" ,
2024-04-30 20:03:28 +00:00
"versionEndExcluding" : "5.15.148" ,
2024-08-27 16:03:16 +00:00
"matchCriteriaId" : "896A2B67-F32A-4E2A-B9F9-FF76186EF44B"
2024-04-30 20:03:28 +00:00
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ,
2024-08-27 16:03:16 +00:00
"versionStartIncluding" : "6.0.10" ,
2024-04-30 20:03:28 +00:00
"versionEndExcluding" : "6.1.75" ,
2024-08-27 16:03:16 +00:00
"matchCriteriaId" : "3F456658-DE6E-4F73-979D-3E6A82AB47C6"
2024-04-30 20:03:28 +00:00
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ,
2024-08-27 16:03:16 +00:00
"versionStartIncluding" : "6.2" ,
2024-04-30 20:03:28 +00:00
"versionEndExcluding" : "6.6.14" ,
2024-08-27 16:03:16 +00:00
"matchCriteriaId" : "5C6B50A6-3D8B-4CE2-BDCC-A098609CBA14"
2024-04-30 20:03:28 +00:00
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ,
2024-08-27 16:03:16 +00:00
"versionStartIncluding" : "6.7" ,
2024-04-30 20:03:28 +00:00
"versionEndExcluding" : "6.7.2" ,
2024-08-27 16:03:16 +00:00
"matchCriteriaId" : "7229C448-E0C9-488B-8939-36BA5254065E"
2024-04-30 20:03:28 +00:00
}
]
}
]
}
] ,
2024-02-23 17:01:16 +00:00
"references" : [
{
"url" : "https://git.kernel.org/stable/c/828cd829483f0cda920710997aed79130b0af690" ,
2024-04-30 20:03:28 +00:00
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67" ,
"tags" : [
"Patch"
]
2024-02-23 17:01:16 +00:00
} ,
{
"url" : "https://git.kernel.org/stable/c/887a558d0298d36297daea039954c39940228d9b" ,
2024-04-30 20:03:28 +00:00
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67" ,
"tags" : [
"Patch"
]
2024-02-23 17:01:16 +00:00
} ,
{
"url" : "https://git.kernel.org/stable/c/95e4e0031effad9837af557ecbfd4294a4d8aeee" ,
2024-04-30 20:03:28 +00:00
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67" ,
"tags" : [
"Patch"
]
2024-02-23 17:01:16 +00:00
} ,
{
"url" : "https://git.kernel.org/stable/c/ad90d0358bd3b4554f243a425168fc7cebe7d04e" ,
2024-04-30 20:03:28 +00:00
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67" ,
"tags" : [
"Patch"
]
2024-02-23 17:01:16 +00:00
} ,
{
"url" : "https://git.kernel.org/stable/c/b502fb43f7fb55aaf07f6092ab44657595214b93" ,
2024-04-30 20:03:28 +00:00
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67" ,
"tags" : [
"Patch"
]
2024-02-23 17:01:16 +00:00
} ,
{
"url" : "https://git.kernel.org/stable/c/bc57f3ef8a9eb0180606696f586a6dcfaa175ed0" ,
2024-04-30 20:03:28 +00:00
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67" ,
"tags" : [
"Patch"
]
2024-02-23 17:01:16 +00:00
} ,
{
"url" : "https://git.kernel.org/stable/c/d74173bda29aba58f822175d983d07c8ed335494" ,
2024-04-30 20:03:28 +00:00
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67" ,
"tags" : [
"Patch"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://git.kernel.org/stable/c/828cd829483f0cda920710997aed79130b0af690" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "https://git.kernel.org/stable/c/887a558d0298d36297daea039954c39940228d9b" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "https://git.kernel.org/stable/c/95e4e0031effad9837af557ecbfd4294a4d8aeee" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "https://git.kernel.org/stable/c/ad90d0358bd3b4554f243a425168fc7cebe7d04e" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "https://git.kernel.org/stable/c/b502fb43f7fb55aaf07f6092ab44657595214b93" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "https://git.kernel.org/stable/c/bc57f3ef8a9eb0180606696f586a6dcfaa175ed0" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "https://git.kernel.org/stable/c/d74173bda29aba58f822175d983d07c8ed335494" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
2024-02-23 17:01:16 +00:00
}
]
}