Vulnerability Details : CVE-2023-52840
In the Linux kernel, the following vulnerability has been resolved:
Input: synaptics-rmi4 - fix use after free in rmi_unregister_function()
The put_device() calls rmi_release_function() which frees "fn" so the
dereference on the next line "fn->num_of_irqs" is a use after free.
Move the put_device() to the end to fix this.
Vulnerability category: Memory Corruption
Products affected by CVE-2023-52840
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-52840
0.05%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 15 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-52840
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST | 2024-12-31 |
CWE ids for CVE-2023-52840
-
The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2023-52840
-
https://git.kernel.org/stable/c/6c71e065befb2fae8f1461559b940c04e1071bd5
Input: synaptics-rmi4 - fix use after free in rmi_unregister_function() - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/eb988e46da2e4eae89f5337e047ce372fe33d5b1
Input: synaptics-rmi4 - fix use after free in rmi_unregister_function() - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/303766bb92c5c225cf40f9bbbe7e29749406e2f2
Input: synaptics-rmi4 - fix use after free in rmi_unregister_function() - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/c8e639f5743cf4b01f8c65e0df075fe4d782b585
Input: synaptics-rmi4 - fix use after free in rmi_unregister_function() - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/7082b1fb5321037bc11ba1cf2d7ed23c6b2b521f
Input: synaptics-rmi4 - fix use after free in rmi_unregister_function() - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/cc56c4d17721dcb10ad4e9c9266e449be1462683
Input: synaptics-rmi4 - fix use after free in rmi_unregister_function() - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/50d12253666195a14c6cd2b81c376e2dbeedbdff
Input: synaptics-rmi4 - fix use after free in rmi_unregister_function() - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/2f236d8638f5b43e0c72919a6a27fe286c32053f
Input: synaptics-rmi4 - fix use after free in rmi_unregister_function() - kernel/git/stable/linux.git - Linux kernel stable treePatch
Jump to