CVE-2023-52502
net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn()
Description
In the Linux kernel, the following vulnerability has been resolved: net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() Sili Luo reported a race in nfc_llcp_sock_get(), leading to UAF. Getting a reference on the socket found in a lookup while holding a lock should happen before releasing the lock. nfc_llcp_sock_get_sn() has a similar problem. Finally nfc_llcp_recv_snl() needs to make sure the socket found by nfc_llcp_sock_from_sn() does not disappear.
INFO
Published Date :
March 2, 2024, 10:15 p.m.
Last Modified :
March 19, 2025, 4:11 p.m.
Remotely Exploit :
No
Source :
416baaa9-dc9f-4396-8d5f-8c081fb06d67
CVSS Scores
| Score | Version | Severity | Vector | Exploitability Score | Impact Score | Source |
|---|---|---|---|---|---|---|
| CVSS 3.1 | MEDIUM | 134c704f-9b21-4f2e-91b3-4a467353bcc0 |
Solution
- Update the affected Linux kernel packages.
- Reboot the system if required.
References to Advisories, Solutions, and Tools
Here, you will find a curated list of external links that provide in-depth
information, practical solutions, and valuable tools related to
CVE-2023-52502.
CWE - Common Weakness Enumeration
While CVE identifies
specific instances of vulnerabilities, CWE categorizes the common flaws or
weaknesses that can lead to vulnerabilities. CVE-2023-52502 is
associated with the following CWEs:
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
(CAPEC)
stores attack patterns, which are descriptions of the common attributes and
approaches employed by adversaries to exploit the CVE-2023-52502
weaknesses.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2023-52502 vulnerability anywhere in the article.
The following table lists the changes that have been made to the
CVE-2023-52502 vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
Initial Analysis by [email protected]
Mar. 19, 2025
Action Type Old Value New Value Added CWE CWE-362 Added CWE CWE-416 Added CPE Configuration OR *cpe:2.3:o:linux:linux_kernel:6.6:rc1:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:6.6:rc2:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:6.6:rc3:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:6.6:rc4:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:6.6:rc5:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.5 up to (excluding) 5.10.199 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 3.6 up to (excluding) 4.19.297 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.20 up to (excluding) 5.4.259 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.11 up to (excluding) 5.15.136 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.16 up to (excluding) 6.1.59 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.2 up to (excluding) 6.5.8 Added Reference Type CVE: https://git.kernel.org/stable/c/31c07dffafce914c1d1543c135382a11ff058d93 Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/31c07dffafce914c1d1543c135382a11ff058d93 Types: Patch Added Reference Type CVE: https://git.kernel.org/stable/c/6ac22ecdaad2ecc662048f8c6b0ceb1ca0699ef9 Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/6ac22ecdaad2ecc662048f8c6b0ceb1ca0699ef9 Types: Patch Added Reference Type CVE: https://git.kernel.org/stable/c/7adcf014bda16cdbf804af5c164d94d5d025db2d Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/7adcf014bda16cdbf804af5c164d94d5d025db2d Types: Patch Added Reference Type CVE: https://git.kernel.org/stable/c/d1af8a39cf839d93c8967fdd858f6bbdc3e4a15c Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/d1af8a39cf839d93c8967fdd858f6bbdc3e4a15c Types: Patch Added Reference Type CVE: https://git.kernel.org/stable/c/d888d3f70b0de32b4f51534175f039ddab15eef8 Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/d888d3f70b0de32b4f51534175f039ddab15eef8 Types: Patch Added Reference Type CVE: https://git.kernel.org/stable/c/e4f2611f07c87b3ddb57c4b9e8efcd1e330fc3dc Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/e4f2611f07c87b3ddb57c4b9e8efcd1e330fc3dc Types: Patch Added Reference Type CVE: https://git.kernel.org/stable/c/e863f5720a5680e50c4cecf12424d7cc31b3eb0a Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/e863f5720a5680e50c4cecf12424d7cc31b3eb0a Types: Patch -
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
Nov. 21, 2024
Action Type Old Value New Value Added Reference https://git.kernel.org/stable/c/31c07dffafce914c1d1543c135382a11ff058d93 Added Reference https://git.kernel.org/stable/c/6ac22ecdaad2ecc662048f8c6b0ceb1ca0699ef9 Added Reference https://git.kernel.org/stable/c/7adcf014bda16cdbf804af5c164d94d5d025db2d Added Reference https://git.kernel.org/stable/c/d1af8a39cf839d93c8967fdd858f6bbdc3e4a15c Added Reference https://git.kernel.org/stable/c/d888d3f70b0de32b4f51534175f039ddab15eef8 Added Reference https://git.kernel.org/stable/c/e4f2611f07c87b3ddb57c4b9e8efcd1e330fc3dc Added Reference https://git.kernel.org/stable/c/e863f5720a5680e50c4cecf12424d7cc31b3eb0a -
CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0
Nov. 05, 2024
Action Type Old Value New Value Added CVSS V3.1 CISA-ADP AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H -
CVE Modified by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
May. 28, 2024
Action Type Old Value New Value -
CVE Modified by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
May. 14, 2024
Action Type Old Value New Value -
CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Mar. 02, 2024
Action Type Old Value New Value Added Description In the Linux kernel, the following vulnerability has been resolved: net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() Sili Luo reported a race in nfc_llcp_sock_get(), leading to UAF. Getting a reference on the socket found in a lookup while holding a lock should happen before releasing the lock. nfc_llcp_sock_get_sn() has a similar problem. Finally nfc_llcp_recv_snl() needs to make sure the socket found by nfc_llcp_sock_from_sn() does not disappear. Added Reference Linux https://git.kernel.org/stable/c/e863f5720a5680e50c4cecf12424d7cc31b3eb0a [No types assigned] Added Reference Linux https://git.kernel.org/stable/c/7adcf014bda16cdbf804af5c164d94d5d025db2d [No types assigned] Added Reference Linux https://git.kernel.org/stable/c/6ac22ecdaad2ecc662048f8c6b0ceb1ca0699ef9 [No types assigned] Added Reference Linux https://git.kernel.org/stable/c/d888d3f70b0de32b4f51534175f039ddab15eef8 [No types assigned] Added Reference Linux https://git.kernel.org/stable/c/e4f2611f07c87b3ddb57c4b9e8efcd1e330fc3dc [No types assigned] Added Reference Linux https://git.kernel.org/stable/c/d1af8a39cf839d93c8967fdd858f6bbdc3e4a15c [No types assigned] Added Reference Linux https://git.kernel.org/stable/c/31c07dffafce914c1d1543c135382a11ff058d93 [No types assigned]