We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2023-53039

HID: intel-ish-hid: ipc: Fix potential use-after-free in work function



Description

In the Linux kernel, the following vulnerability has been resolved: HID: intel-ish-hid: ipc: Fix potential use-after-free in work function When a reset notify IPC message is received, the ISR schedules a work function and passes the ISHTP device to it via a global pointer ishtp_dev. If ish_probe() fails, the devm-managed device resources including ishtp_dev are freed, but the work is not cancelled, causing a use-after-free when the work function tries to access ishtp_dev. Use devm_work_autocancel() instead, so that the work is automatically cancelled if probe fails.

Reserved 2025-04-16 | Published 2025-05-02 | Updated 2025-05-04 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 8c1d378b8c224fd50247625255f09fc01dcc5836
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 0a594cb490ca6232671fc09e2dc1a0fc7ccbb0b5
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before d3ce3afd9f791dd1b7daedfcf8c396b60af5dec0
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 8ae2f2b0a28416ed2f6d8478ac8b9f7862f36785
affected

Default status
affected

5.15.105
unaffected

6.1.22
unaffected

6.2.9
unaffected

6.3
unaffected

References

git.kernel.org/...c/8c1d378b8c224fd50247625255f09fc01dcc5836

git.kernel.org/...c/0a594cb490ca6232671fc09e2dc1a0fc7ccbb0b5

git.kernel.org/...c/d3ce3afd9f791dd1b7daedfcf8c396b60af5dec0

git.kernel.org/...c/8ae2f2b0a28416ed2f6d8478ac8b9f7862f36785

cve.org (CVE-2023-53039)

nvd.nist.gov (CVE-2023-53039)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2023-53039

Support options

Helpdesk Chat, Email, Knowledgebase