{"id":"CVE-2023-52510","summary":"ieee802154: ca8210: Fix a potential UAF in ca8210_probe","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nieee802154: ca8210: Fix a potential UAF in ca8210_probe\n\nIf of_clk_add_provider() fails in ca8210_register_ext_clock(),\nit calls clk_unregister() to release priv-\u003eclk and returns an\nerror. However, the caller ca8210_probe() then calls ca8210_remove(),\nwhere priv-\u003eclk is freed again in ca8210_unregister_ext_clock(). In\nthis case, a use-after-free may happen in the second time we call\nclk_unregister().\n\nFix this by removing the first clk_unregister(). Also, priv-\u003eclk could\nbe an error code on failure of clk_register_fixed_rate(). Use\nIS_ERR_OR_NULL to catch this case in ca8210_unregister_ext_clock().","modified":"2026-04-02T09:42:56.616898Z","published":"2024-03-02T21:52:22.645Z","related":["SUSE-SU-2024:1320-1","SUSE-SU-2024:1321-1","SUSE-SU-2024:1466-1","SUSE-SU-2024:1480-1","SUSE-SU-2024:1490-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52510.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/217efe32a45249eb07dcd7197e8403de98345e66"},{"type":"WEB","url":"https://git.kernel.org/stable/c/28b68cba378e3e50a4082b65f262bc4f2c7c2add"},{"type":"WEB","url":"https://git.kernel.org/stable/c/55e06850c7894f00d41b767c5f5665459f83f58f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/84c6aa0ae5c4dc121f9996bb8fed46c80909d80e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/85c2857ef90041f567ce98722c1c342c4d31f4bc"},{"type":"WEB","url":"https://git.kernel.org/stable/c/becf5c147198f4345243c5df0c4f035415491640"},{"type":"WEB","url":"https://git.kernel.org/stable/c/cdb46be93c1f7bbf2c4649e9fc5fb147cfb5245d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f990874b1c98fe8e57ee9385669f501822979258"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52510.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52510"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"ded845a781a578dfb0b5b2c138e5a067aa3b1242"},{"fixed":"28b68cba378e3e50a4082b65f262bc4f2c7c2add"},{"fixed":"cdb46be93c1f7bbf2c4649e9fc5fb147cfb5245d"},{"fixed":"85c2857ef90041f567ce98722c1c342c4d31f4bc"},{"fixed":"55e06850c7894f00d41b767c5f5665459f83f58f"},{"fixed":"84c6aa0ae5c4dc121f9996bb8fed46c80909d80e"},{"fixed":"217efe32a45249eb07dcd7197e8403de98345e66"},{"fixed":"becf5c147198f4345243c5df0c4f035415491640"},{"fixed":"f990874b1c98fe8e57ee9385669f501822979258"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-52510.json"}}],"schema_version":"1.7.5"}