{"dataType":"CVE_RECORD","cveMetadata":{"cveId":"CVE-2023-52457","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2024-02-20T12:30:33.294Z","datePublished":"2024-02-23T14:46:19.772Z","dateUpdated":"2025-05-04T12:49:03.340Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2025-05-04T12:49:03.340Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nserial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed\n\nReturning an error code from .remove() makes the driver core emit the\nlittle helpful error message:\n\n\tremove callback returned a non-zero value. This will be ignored.\n\nand then remove the device anyhow. So all resources that were not freed\nare leaked in this case. Skipping serial8250_unregister_port() has the\npotential to keep enough of the UART around to trigger a use-after-free.\n\nSo replace the error return (and with it the little helpful error\nmessage) by a more useful error message and continue to cleanup."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/tty/serial/8250/8250_omap.c"],"versions":[{"version":"2d66412563ef8953e2bac2d98d2d832b3f3f49cd","lessThan":"b502fb43f7fb55aaf07f6092ab44657595214b93","status":"affected","versionType":"git"},{"version":"d833cba201adf9237168e19f0d76e4d7aa69f303","lessThan":"bc57f3ef8a9eb0180606696f586a6dcfaa175ed0","status":"affected","versionType":"git"},{"version":"e0db709a58bdeb8966890882261a3f8438c5c9b7","lessThan":"828cd829483f0cda920710997aed79130b0af690","status":"affected","versionType":"git"},{"version":"e3f0c638f428fd66b5871154b62706772045f91a","lessThan":"d74173bda29aba58f822175d983d07c8ed335494","status":"affected","versionType":"git"},{"version":"e3f0c638f428fd66b5871154b62706772045f91a","lessThan":"887a558d0298d36297daea039954c39940228d9b","status":"affected","versionType":"git"},{"version":"e3f0c638f428fd66b5871154b62706772045f91a","lessThan":"95e4e0031effad9837af557ecbfd4294a4d8aeee","status":"affected","versionType":"git"},{"version":"e3f0c638f428fd66b5871154b62706772045f91a","lessThan":"ad90d0358bd3b4554f243a425168fc7cebe7d04e","status":"affected","versionType":"git"},{"version":"02eed6390dbe61115f3e3f63829c95c611aee67b","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/tty/serial/8250/8250_omap.c"],"versions":[{"version":"6.1","status":"affected"},{"version":"0","lessThan":"6.1","status":"unaffected","versionType":"semver"},{"version":"5.4.268","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.209","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.148","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.75","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.6.14","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.7.2","lessThanOrEqual":"6.7.*","status":"unaffected","versionType":"semver"},{"version":"6.8","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.4.225","versionEndExcluding":"5.4.268"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.10.156","versionEndExcluding":"5.10.209"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.15.80","versionEndExcluding":"5.15.148"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.1","versionEndExcluding":"6.1.75"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.1","versionEndExcluding":"6.6.14"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.1","versionEndExcluding":"6.7.2"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.1","versionEndExcluding":"6.8"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.0.10"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/b502fb43f7fb55aaf07f6092ab44657595214b93"},{"url":"https://git.kernel.org/stable/c/bc57f3ef8a9eb0180606696f586a6dcfaa175ed0"},{"url":"https://git.kernel.org/stable/c/828cd829483f0cda920710997aed79130b0af690"},{"url":"https://git.kernel.org/stable/c/d74173bda29aba58f822175d983d07c8ed335494"},{"url":"https://git.kernel.org/stable/c/887a558d0298d36297daea039954c39940228d9b"},{"url":"https://git.kernel.org/stable/c/95e4e0031effad9837af557ecbfd4294a4d8aeee"},{"url":"https://git.kernel.org/stable/c/ad90d0358bd3b4554f243a425168fc7cebe7d04e"}],"title":"serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T23:03:19.619Z"},"title":"CVE Program Container","references":[{"url":"https://git.kernel.org/stable/c/b502fb43f7fb55aaf07f6092ab44657595214b93","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/bc57f3ef8a9eb0180606696f586a6dcfaa175ed0","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/828cd829483f0cda920710997aed79130b0af690","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/d74173bda29aba58f822175d983d07c8ed335494","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/887a558d0298d36297daea039954c39940228d9b","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/95e4e0031effad9837af557ecbfd4294a4d8aeee","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/ad90d0358bd3b4554f243a425168fc7cebe7d04e","tags":["x_transferred"]},{"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2023-52457","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2024-09-10T16:02:36.778988Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-11T17:33:47.687Z"}}]},"dataVersion":"5.1"}