{"id":"CVE-2023-52475","summary":"Input: powermate - fix use-after-free in powermate_config_complete","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nInput: powermate - fix use-after-free in powermate_config_complete\n\nsyzbot has found a use-after-free bug [1] in the powermate driver. This\nhappens when the device is disconnected, which leads to a memory free from\nthe powermate_device struct.  When an asynchronous control message\ncompletes after the kfree and its callback is invoked, the lock does not\nexist anymore and hence the bug.\n\nUse usb_kill_urb() on pm-\u003econfig to cancel any in-progress requests upon\ndevice disconnection.\n\n[1] https://syzkaller.appspot.com/bug?extid=0434ac83f907a1dbdd1e","modified":"2026-04-11T12:46:31.374231Z","published":"2024-02-29T05:43:08.838Z","related":["SUSE-SU-2024:0855-1","SUSE-SU-2024:0856-1","SUSE-SU-2024:0857-1","SUSE-SU-2024:0858-1","SUSE-SU-2024:0900-1","SUSE-SU-2024:0900-2","SUSE-SU-2024:0910-1","SUSE-SU-2024:0925-1","SUSE-SU-2024:0926-1","SUSE-SU-2024:0975-1","SUSE-SU-2024:0976-1","SUSE-SU-2024:0977-1","SUSE-SU-2024:1669-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52475.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/2efe67c581a2a6122b328d4bb6f21b3f36f40d46"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5aa514100aaf59868d745196258269a16737c7bd"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5c15c60e7be615f05a45cd905093a54b11f461bc"},{"type":"WEB","url":"https://git.kernel.org/stable/c/67cace72606baf1758fd60feb358f4c6be92e1cc"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6a4a396386404e62fb59bc3bde48871a64a82b4f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8677575c4f39d65bf0d719b5d20e8042e550ccb9"},{"type":"WEB","url":"https://git.kernel.org/stable/c/cd2fbfd8b922b7fdd50732e47d797754ab59cb06"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e528b1b9d60743e0b26224e3fe7aa74c24b8b2f8"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52475.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52475"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"1da177e4c3f41524e886b7f1b8a0c1fc7321cac2"},{"fixed":"8677575c4f39d65bf0d719b5d20e8042e550ccb9"},{"fixed":"67cace72606baf1758fd60feb358f4c6be92e1cc"},{"fixed":"5aa514100aaf59868d745196258269a16737c7bd"},{"fixed":"cd2fbfd8b922b7fdd50732e47d797754ab59cb06"},{"fixed":"6a4a396386404e62fb59bc3bde48871a64a82b4f"},{"fixed":"2efe67c581a2a6122b328d4bb6f21b3f36f40d46"},{"fixed":"e528b1b9d60743e0b26224e3fe7aa74c24b8b2f8"},{"fixed":"5c15c60e7be615f05a45cd905093a54b11f461bc"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52475.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"2.6.12"},{"fixed":"4.14.328"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.15.0"},{"fixed":"4.19.297"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.20.0"},{"fixed":"5.4.259"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.199"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.136"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.59"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.5.8"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52475.json"}}],"schema_version":"1.7.5"}