In the Linux kernel, the following vulnerability has been resolved: ieee802154: ca8210: Fix a potential UAF in ca8210_probe If of_clk_add_provider() fails in ca8210_register_ext_clock(), it calls clk_unregister() to release priv->clk and returns an error. However, the caller ca8210_probe() then calls ca8210_remove(), where priv->clk is freed again in ca8210_unregister_ext_clock(). In this case, a use-after-free may happen in the second time we call clk_unregister(). Fix this by removing the first clk_unregister(). Also, priv->clk could be an error code on failure of clk_register_fixed_rate(). Use IS_ERR_OR_NULL to catch this case in ca8210_unregister_ext_clock().
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published: 2024-03-02T21:52:22.645Z

Updated: 2024-11-04T14:48:16.928Z

Reserved: 2024-02-20T12:30:33.315Z

Link: CVE-2023-52510

cve-icon Vulnrichment

Updated: 2024-08-02T23:03:20.696Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-03-02T22:15:47.587

Modified: 2024-03-04T13:58:23.447

Link: CVE-2023-52510

cve-icon Redhat

Severity : Low

Publid Date: 2024-03-02T00:00:00Z

Links: CVE-2023-52510 - Bugzilla