5.5
CVE-2023-52781
- EPSS 0.01%
- Published 21.05.2024 16:15:17
- Last modified 25.09.2025 16:40:04
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: usb: config: fix iteration issue in 'usb_get_bos_descriptor()' The BOS descriptor defines a root descriptor and is the base descriptor for accessing a family of related descriptors. Function 'usb_get_bos_descriptor()' encounters an iteration issue when skipping the 'USB_DT_DEVICE_CAPABILITY' descriptor type. This results in the same descriptor being read repeatedly. To address this issue, a 'goto' statement is introduced to ensure that the pointer and the amount read is updated correctly. This ensures that the function iterates to the next descriptor instead of reading the same descriptor repeatedly.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Data is provided by the National Vulnerability Database (NVD)
Linux ≫ Linux Kernel Version >= 3.16.79 < 3.17
Linux ≫ Linux Kernel Version >= 4.4.194 < 4.5
Linux ≫ Linux Kernel Version >= 4.9.194 < 4.10
Linux ≫ Linux Kernel Version >= 4.14.146 < 4.15
Linux ≫ Linux Kernel Version >= 4.19.75 < 4.20
Linux ≫ Linux Kernel Version >= 5.2.17 < 5.3
Linux ≫ Linux Kernel Version >= 5.3.1 < 5.10.203
Linux ≫ Linux Kernel Version >= 5.11 < 5.15.142
Linux ≫ Linux Kernel Version >= 5.16 < 6.1.66
Linux ≫ Linux Kernel Version >= 6.2 < 6.6.4
Linux ≫ Linux Kernel Version6.7 Updaterc1
Linux ≫ Linux Kernel Version6.7 Updaterc2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.01% | 0.002 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 5.5 | 1.8 | 3.6 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
|
CWE-670 Always-Incorrect Control Flow Implementation
The code contains a control flow path that does not reflect the algorithm that the path is intended to implement, leading to incorrect behavior any time this path is navigated.