{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-52708","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2024-03-07T14:49:46.892Z","datePublished":"2024-05-21T15:22:55.975Z","dateUpdated":"2025-05-04T07:42:05.019Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2025-05-04T07:42:05.019Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nmmc: mmc_spi: fix error handling in mmc_spi_probe()\n\nIf mmc_add_host() fails, it doesn't need to call mmc_remove_host(),\nor it will cause null-ptr-deref, because of deleting a not added\ndevice in mmc_remove_host().\n\nTo fix this, goto label 'fail_glue_init', if mmc_add_host() fails,\nand change the label 'fail_add_host' to 'fail_gpiod_request'."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/mmc/host/mmc_spi.c"],"versions":[{"version":"15a0580ced081a0f7dc2deea8a4812bdc5e9a109","lessThan":"e9b488d60f51ae312006e224e03a30a151c28bdd","status":"affected","versionType":"git"},{"version":"15a0580ced081a0f7dc2deea8a4812bdc5e9a109","lessThan":"0b3edcb24bd81b3b2e3dac89f4733bfd47d283be","status":"affected","versionType":"git"},{"version":"15a0580ced081a0f7dc2deea8a4812bdc5e9a109","lessThan":"ecad2fafd424ffdc203b2748ded0b37e4bbecef3","status":"affected","versionType":"git"},{"version":"15a0580ced081a0f7dc2deea8a4812bdc5e9a109","lessThan":"82645bf4ed02abe930a659c5fe16d593a6dbd93f","status":"affected","versionType":"git"},{"version":"15a0580ced081a0f7dc2deea8a4812bdc5e9a109","lessThan":"cf4c9d2ac1e42c7d18b921bec39486896645b714","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/mmc/host/mmc_spi.c"],"versions":[{"version":"2.6.24","status":"affected"},{"version":"0","lessThan":"2.6.24","status":"unaffected","versionType":"semver"},{"version":"5.4.232","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.169","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.95","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.13","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.2","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.24","versionEndExcluding":"5.4.232"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.24","versionEndExcluding":"5.10.169"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.24","versionEndExcluding":"5.15.95"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.24","versionEndExcluding":"6.1.13"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.24","versionEndExcluding":"6.2"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/e9b488d60f51ae312006e224e03a30a151c28bdd"},{"url":"https://git.kernel.org/stable/c/0b3edcb24bd81b3b2e3dac89f4733bfd47d283be"},{"url":"https://git.kernel.org/stable/c/ecad2fafd424ffdc203b2748ded0b37e4bbecef3"},{"url":"https://git.kernel.org/stable/c/82645bf4ed02abe930a659c5fe16d593a6dbd93f"},{"url":"https://git.kernel.org/stable/c/cf4c9d2ac1e42c7d18b921bec39486896645b714"}],"title":"mmc: mmc_spi: fix error handling in mmc_spi_probe()","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"title":"CISA ADP Vulnrichment","metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2023-52708","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2024-05-22T18:27:42.948187Z"}}}],"providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-06-04T17:23:21.454Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T23:11:36.045Z"},"title":"CVE Program Container","references":[{"url":"https://git.kernel.org/stable/c/e9b488d60f51ae312006e224e03a30a151c28bdd","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/0b3edcb24bd81b3b2e3dac89f4733bfd47d283be","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/ecad2fafd424ffdc203b2748ded0b37e4bbecef3","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/82645bf4ed02abe930a659c5fe16d593a6dbd93f","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/cf4c9d2ac1e42c7d18b921bec39486896645b714","tags":["x_transferred"]}]}]}}