In the Linux kernel, the following vulnerability has been resolved:
ieee802154: ca8210: Fix a potential UAF in ca8210_probe
If of_clk_add_provider() fails in ca8210_register_ext_clock(),
it calls clk_unregister() to release priv->clk and returns an
error. However, the caller ca8210_probe() then calls ca8210_remove(),
where priv->clk is freed again in ca8210_unregister_ext_clock(). In
this case, a use-after-free may happen in the second time we call
clk_unregister().
Fix this by removing the first clk_unregister(). Also, priv->clk could
be an error code on failure of clk_register_fixed_rate(). Use
IS_ERR_OR_NULL to catch this case in ca8210_unregister_ext_clock().
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: Linux
Published: 2024-03-02T21:52:22.645Z
Updated: 2024-11-04T14:48:16.928Z
Reserved: 2024-02-20T12:30:33.315Z
Link: CVE-2023-52510
Vulnrichment
Updated: 2024-08-02T23:03:20.696Z
NVD
Status : Awaiting Analysis
Published: 2024-03-02T22:15:47.587
Modified: 2024-03-04T13:58:23.447
Link: CVE-2023-52510
Redhat