Vulnerability Details : CVE-2023-25012
The Linux kernel through 6.1.9 has a Use-After-Free in bigben_remove in drivers/hid/hid-bigbenff.c via a crafted USB device because the LED controllers remain registered for too long.
Vulnerability category: Memory Corruption
Exploit prediction scoring system (EPSS) score for CVE-2023-25012
Probability of exploitation activity in the next 30 days: 0.04%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 8 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2023-25012
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
4.6
|
MEDIUM | CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
0.9
|
3.6
|
nvd@nist.gov |
CWE ids for CVE-2023-25012
-
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.Assigned by: nvd@nist.gov (Primary)
References for CVE-2023-25012
-
http://www.openwall.com/lists/oss-security/2023/11/05/1
oss-security - CVE-2023-1078: Linux: rds_rm_zerocopy_callback() bugs
-
https://seclists.org/oss-sec/2023/q1/53
oss-sec: Linux Kernel: hid: Use-After-Free in bigben_set_led()Exploit;Mailing List;Third Party Advisory
-
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
[SECURITY] [DLA 3404-1] linux-5.10 security update
-
https://lore.kernel.org/all/20230125-hid-unregister-leds-v1-1-9a5192dcef16@diag.uniroma1.it/
[PATCH 1/5] HID: bigben_remove: manually unregister leds - Pietro BorrelloMailing List;Patch;Vendor Advisory
-
http://www.openwall.com/lists/oss-security/2023/02/02/1
oss-security - Re: Linux Kernel: hid: Use-After-Free in bigben_set_led()Exploit;Mailing List;Third Party Advisory
Products affected by CVE-2023-25012
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*