CVE-2023-52781 (GCVE-0-2023-52781)
Vulnerability from cvelistv5
Published
2024-05-21 15:31
Modified
2025-05-04 12:49
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: usb: config: fix iteration issue in 'usb_get_bos_descriptor()' The BOS descriptor defines a root descriptor and is the base descriptor for accessing a family of related descriptors. Function 'usb_get_bos_descriptor()' encounters an iteration issue when skipping the 'USB_DT_DEVICE_CAPABILITY' descriptor type. This results in the same descriptor being read repeatedly. To address this issue, a 'goto' statement is introduced to ensure that the pointer and the amount read is updated correctly. This ensures that the function iterates to the next descriptor instead of reading the same descriptor repeatedly.
Impacted products
Vendor Product Version
Linux Linux Version: 3dd550a2d36596a1b0ee7955da3b611c031d3873
Version: 3dd550a2d36596a1b0ee7955da3b611c031d3873
Version: 3dd550a2d36596a1b0ee7955da3b611c031d3873
Version: 3dd550a2d36596a1b0ee7955da3b611c031d3873
Version: 3dd550a2d36596a1b0ee7955da3b611c031d3873
Version: 77ce180d68beffd1af620d0121590e16683fc6b8
Version: 20a07e1aadcd6990893c532d1b2b507bfa065152
Version: a5c051b6503c0ba543e993cfc295b64f096e0a29
Version: ea4a173d8358b756a780786baa3fc39d282bdbe3
Version: 77d4e2a058858b4a94fc469bc1bfc94a0958e252
Version: 1fc15d29540a69cfb55c8b8f8c38f1af33178243
Version: 9f8dd40c68c176f2c3f1fc8b87bc81756856938f
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-52781",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-05-21T17:27:41.275139Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-04T17:22:33.254Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T23:11:35.495Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/9ef94ec8e52eaf7b9abc5b5f8f5b911751112223"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/64c27b7b2357ddb38b6afebaf46d5bff4d250702"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/f89fef7710b2ba0f7a1e46594e530dcf2f77be91"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/7c0244cc311a4038505b73682b7c8ceaa5c7a8c8"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/974bba5c118f4c2baf00de0356e3e4f7928b4cbc"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/usb/core/config.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "9ef94ec8e52eaf7b9abc5b5f8f5b911751112223",
              "status": "affected",
              "version": "3dd550a2d36596a1b0ee7955da3b611c031d3873",
              "versionType": "git"
            },
            {
              "lessThan": "64c27b7b2357ddb38b6afebaf46d5bff4d250702",
              "status": "affected",
              "version": "3dd550a2d36596a1b0ee7955da3b611c031d3873",
              "versionType": "git"
            },
            {
              "lessThan": "f89fef7710b2ba0f7a1e46594e530dcf2f77be91",
              "status": "affected",
              "version": "3dd550a2d36596a1b0ee7955da3b611c031d3873",
              "versionType": "git"
            },
            {
              "lessThan": "7c0244cc311a4038505b73682b7c8ceaa5c7a8c8",
              "status": "affected",
              "version": "3dd550a2d36596a1b0ee7955da3b611c031d3873",
              "versionType": "git"
            },
            {
              "lessThan": "974bba5c118f4c2baf00de0356e3e4f7928b4cbc",
              "status": "affected",
              "version": "3dd550a2d36596a1b0ee7955da3b611c031d3873",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "77ce180d68beffd1af620d0121590e16683fc6b8",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "20a07e1aadcd6990893c532d1b2b507bfa065152",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "a5c051b6503c0ba543e993cfc295b64f096e0a29",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "ea4a173d8358b756a780786baa3fc39d282bdbe3",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "77d4e2a058858b4a94fc469bc1bfc94a0958e252",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "1fc15d29540a69cfb55c8b8f8c38f1af33178243",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "9f8dd40c68c176f2c3f1fc8b87bc81756856938f",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/usb/core/config.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "5.4"
            },
            {
              "lessThan": "5.4",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.203",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.142",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.66",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.4",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.7",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.10.203",
                  "versionStartIncluding": "5.4",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.15.142",
                  "versionStartIncluding": "5.4",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.1.66",
                  "versionStartIncluding": "5.4",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.6.4",
                  "versionStartIncluding": "5.4",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.7",
                  "versionStartIncluding": "5.4",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "3.16.79",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "4.4.194",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "4.9.194",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "4.14.146",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "4.19.75",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "5.2.17",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "5.3.1",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: config: fix iteration issue in \u0027usb_get_bos_descriptor()\u0027\n\nThe BOS descriptor defines a root descriptor and is the base descriptor for\naccessing a family of related descriptors.\n\nFunction \u0027usb_get_bos_descriptor()\u0027 encounters an iteration issue when\nskipping the \u0027USB_DT_DEVICE_CAPABILITY\u0027 descriptor type. This results in\nthe same descriptor being read repeatedly.\n\nTo address this issue, a \u0027goto\u0027 statement is introduced to ensure that the\npointer and the amount read is updated correctly. This ensures that the\nfunction iterates to the next descriptor instead of reading the same\ndescriptor repeatedly."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-04T12:49:36.372Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/9ef94ec8e52eaf7b9abc5b5f8f5b911751112223"
        },
        {
          "url": "https://git.kernel.org/stable/c/64c27b7b2357ddb38b6afebaf46d5bff4d250702"
        },
        {
          "url": "https://git.kernel.org/stable/c/f89fef7710b2ba0f7a1e46594e530dcf2f77be91"
        },
        {
          "url": "https://git.kernel.org/stable/c/7c0244cc311a4038505b73682b7c8ceaa5c7a8c8"
        },
        {
          "url": "https://git.kernel.org/stable/c/974bba5c118f4c2baf00de0356e3e4f7928b4cbc"
        }
      ],
      "title": "usb: config: fix iteration issue in \u0027usb_get_bos_descriptor()\u0027",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2023-52781",
    "datePublished": "2024-05-21T15:31:00.242Z",
    "dateReserved": "2024-05-21T15:19:24.240Z",
    "dateUpdated": "2025-05-04T12:49:36.372Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://git.kernel.org/stable/c/9ef94ec8e52eaf7b9abc5b5f8f5b911751112223\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/64c27b7b2357ddb38b6afebaf46d5bff4d250702\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/f89fef7710b2ba0f7a1e46594e530dcf2f77be91\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/7c0244cc311a4038505b73682b7c8ceaa5c7a8c8\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/974bba5c118f4c2baf00de0356e3e4f7928b4cbc\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T23:11:35.495Z\"}}, {\"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-52781\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-05-21T17:27:41.275139Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-05-23T19:01:25.261Z\"}, \"title\": \"CISA ADP Vulnrichment\"}], \"cna\": {\"title\": \"usb: config: fix iteration issue in \u0027usb_get_bos_descriptor()\u0027\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"3dd550a2d36596a1b0ee7955da3b611c031d3873\", \"lessThan\": \"9ef94ec8e52eaf7b9abc5b5f8f5b911751112223\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"3dd550a2d36596a1b0ee7955da3b611c031d3873\", \"lessThan\": \"64c27b7b2357ddb38b6afebaf46d5bff4d250702\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"3dd550a2d36596a1b0ee7955da3b611c031d3873\", \"lessThan\": \"f89fef7710b2ba0f7a1e46594e530dcf2f77be91\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"3dd550a2d36596a1b0ee7955da3b611c031d3873\", \"lessThan\": \"7c0244cc311a4038505b73682b7c8ceaa5c7a8c8\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"3dd550a2d36596a1b0ee7955da3b611c031d3873\", \"lessThan\": \"974bba5c118f4c2baf00de0356e3e4f7928b4cbc\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"77ce180d68beffd1af620d0121590e16683fc6b8\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"20a07e1aadcd6990893c532d1b2b507bfa065152\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"a5c051b6503c0ba543e993cfc295b64f096e0a29\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"ea4a173d8358b756a780786baa3fc39d282bdbe3\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"77d4e2a058858b4a94fc469bc1bfc94a0958e252\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"1fc15d29540a69cfb55c8b8f8c38f1af33178243\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"9f8dd40c68c176f2c3f1fc8b87bc81756856938f\", \"versionType\": \"git\"}], \"programFiles\": [\"drivers/usb/core/config.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"5.4\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"5.4\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"5.10.203\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.10.*\"}, {\"status\": \"unaffected\", \"version\": \"5.15.142\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.15.*\"}, {\"status\": \"unaffected\", \"version\": \"6.1.66\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.1.*\"}, {\"status\": \"unaffected\", \"version\": \"6.6.4\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.6.*\"}, {\"status\": \"unaffected\", \"version\": \"6.7\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"drivers/usb/core/config.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/9ef94ec8e52eaf7b9abc5b5f8f5b911751112223\"}, {\"url\": \"https://git.kernel.org/stable/c/64c27b7b2357ddb38b6afebaf46d5bff4d250702\"}, {\"url\": \"https://git.kernel.org/stable/c/f89fef7710b2ba0f7a1e46594e530dcf2f77be91\"}, {\"url\": \"https://git.kernel.org/stable/c/7c0244cc311a4038505b73682b7c8ceaa5c7a8c8\"}, {\"url\": \"https://git.kernel.org/stable/c/974bba5c118f4c2baf00de0356e3e4f7928b4cbc\"}], \"x_generator\": {\"engine\": \"bippy-1.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nusb: config: fix iteration issue in \u0027usb_get_bos_descriptor()\u0027\\n\\nThe BOS descriptor defines a root descriptor and is the base descriptor for\\naccessing a family of related descriptors.\\n\\nFunction \u0027usb_get_bos_descriptor()\u0027 encounters an iteration issue when\\nskipping the \u0027USB_DT_DEVICE_CAPABILITY\u0027 descriptor type. This results in\\nthe same descriptor being read repeatedly.\\n\\nTo address this issue, a \u0027goto\u0027 statement is introduced to ensure that the\\npointer and the amount read is updated correctly. This ensures that the\\nfunction iterates to the next descriptor instead of reading the same\\ndescriptor repeatedly.\"}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.10.203\", \"versionStartIncluding\": \"5.4\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.15.142\", \"versionStartIncluding\": \"5.4\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.1.66\", \"versionStartIncluding\": \"5.4\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.6.4\", \"versionStartIncluding\": \"5.4\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.7\", \"versionStartIncluding\": \"5.4\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionStartIncluding\": \"3.16.79\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionStartIncluding\": \"4.4.194\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionStartIncluding\": \"4.9.194\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionStartIncluding\": \"4.14.146\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionStartIncluding\": \"4.19.75\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionStartIncluding\": \"5.2.17\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionStartIncluding\": \"5.3.1\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2025-05-04T12:49:36.372Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2023-52781\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-05-04T12:49:36.372Z\", \"dateReserved\": \"2024-05-21T15:19:24.240Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-05-21T15:31:00.242Z\", \"assignerShortName\": \"Linux\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…