{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2023-52475","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2024-02-20T12:30:33.298Z","datePublished":"2024-02-29T05:43:08.838Z","dateUpdated":"2026-01-05T10:16:08.023Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-01-05T10:16:08.023Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nInput: powermate - fix use-after-free in powermate_config_complete\n\nsyzbot has found a use-after-free bug [1] in the powermate driver. This\nhappens when the device is disconnected, which leads to a memory free from\nthe powermate_device struct.  When an asynchronous control message\ncompletes after the kfree and its callback is invoked, the lock does not\nexist anymore and hence the bug.\n\nUse usb_kill_urb() on pm->config to cancel any in-progress requests upon\ndevice disconnection.\n\n[1] https://syzkaller.appspot.com/bug?extid=0434ac83f907a1dbdd1e"}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/input/misc/powermate.c"],"versions":[{"version":"1da177e4c3f41524e886b7f1b8a0c1fc7321cac2","lessThan":"8677575c4f39d65bf0d719b5d20e8042e550ccb9","status":"affected","versionType":"git"},{"version":"1da177e4c3f41524e886b7f1b8a0c1fc7321cac2","lessThan":"67cace72606baf1758fd60feb358f4c6be92e1cc","status":"affected","versionType":"git"},{"version":"1da177e4c3f41524e886b7f1b8a0c1fc7321cac2","lessThan":"5aa514100aaf59868d745196258269a16737c7bd","status":"affected","versionType":"git"},{"version":"1da177e4c3f41524e886b7f1b8a0c1fc7321cac2","lessThan":"cd2fbfd8b922b7fdd50732e47d797754ab59cb06","status":"affected","versionType":"git"},{"version":"1da177e4c3f41524e886b7f1b8a0c1fc7321cac2","lessThan":"6a4a396386404e62fb59bc3bde48871a64a82b4f","status":"affected","versionType":"git"},{"version":"1da177e4c3f41524e886b7f1b8a0c1fc7321cac2","lessThan":"2efe67c581a2a6122b328d4bb6f21b3f36f40d46","status":"affected","versionType":"git"},{"version":"1da177e4c3f41524e886b7f1b8a0c1fc7321cac2","lessThan":"e528b1b9d60743e0b26224e3fe7aa74c24b8b2f8","status":"affected","versionType":"git"},{"version":"1da177e4c3f41524e886b7f1b8a0c1fc7321cac2","lessThan":"5c15c60e7be615f05a45cd905093a54b11f461bc","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/input/misc/powermate.c"],"versions":[{"version":"2.6.12","status":"affected"},{"version":"0","lessThan":"2.6.12","status":"unaffected","versionType":"semver"},{"version":"4.14.328","lessThanOrEqual":"4.14.*","status":"unaffected","versionType":"semver"},{"version":"4.19.297","lessThanOrEqual":"4.19.*","status":"unaffected","versionType":"semver"},{"version":"5.4.259","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.199","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.136","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.59","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.5.8","lessThanOrEqual":"6.5.*","status":"unaffected","versionType":"semver"},{"version":"6.6","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.12","versionEndExcluding":"4.14.328"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.12","versionEndExcluding":"4.19.297"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.12","versionEndExcluding":"5.4.259"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.12","versionEndExcluding":"5.10.199"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.12","versionEndExcluding":"5.15.136"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.12","versionEndExcluding":"6.1.59"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.12","versionEndExcluding":"6.5.8"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.12","versionEndExcluding":"6.6"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/8677575c4f39d65bf0d719b5d20e8042e550ccb9"},{"url":"https://git.kernel.org/stable/c/67cace72606baf1758fd60feb358f4c6be92e1cc"},{"url":"https://git.kernel.org/stable/c/5aa514100aaf59868d745196258269a16737c7bd"},{"url":"https://git.kernel.org/stable/c/cd2fbfd8b922b7fdd50732e47d797754ab59cb06"},{"url":"https://git.kernel.org/stable/c/6a4a396386404e62fb59bc3bde48871a64a82b4f"},{"url":"https://git.kernel.org/stable/c/2efe67c581a2a6122b328d4bb6f21b3f36f40d46"},{"url":"https://git.kernel.org/stable/c/e528b1b9d60743e0b26224e3fe7aa74c24b8b2f8"},{"url":"https://git.kernel.org/stable/c/5c15c60e7be615f05a45cd905093a54b11f461bc"}],"title":"Input: powermate - fix use-after-free in powermate_config_complete","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T23:03:19.912Z"},"title":"CVE Program Container","references":[{"url":"https://git.kernel.org/stable/c/8677575c4f39d65bf0d719b5d20e8042e550ccb9","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/67cace72606baf1758fd60feb358f4c6be92e1cc","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/5aa514100aaf59868d745196258269a16737c7bd","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/cd2fbfd8b922b7fdd50732e47d797754ab59cb06","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/6a4a396386404e62fb59bc3bde48871a64a82b4f","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/2efe67c581a2a6122b328d4bb6f21b3f36f40d46","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/e528b1b9d60743e0b26224e3fe7aa74c24b8b2f8","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/5c15c60e7be615f05a45cd905093a54b11f461bc","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2023-52475","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2024-09-10T15:57:27.329972Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-11T17:33:52.563Z"}}]}}