๐Ÿ” CVE Alert

CVE-2023-52989

MEDIUM 5.5

firewire: fix memory leak for payload of request subaction to IEC 61883-1 FCP region

CVSS Score
5.5
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: firewire: fix memory leak for payload of request subaction to IEC 61883-1 FCP region This patch is fix for Linux kernel v2.6.33 or later. For request subaction to IEC 61883-1 FCP region, Linux FireWire subsystem have had an issue of use-after-free. The subsystem allows multiple user space listeners to the region, while data of the payload was likely released before the listeners execute read(2) to access to it for copying to user space. The issue was fixed by a commit 281e20323ab7 ("firewire: core: fix use-after-free regression in FCP handler"). The object of payload is duplicated in kernel space for each listener. When the listener executes ioctl(2) with FW_CDEV_IOC_SEND_RESPONSE request, the object is going to be released. However, it causes memory leak since the commit relies on call of release_request() in drivers/firewire/core-cdev.c. Against the expectation, the function is never called due to the design of release_client_resource(). The function delegates release task to caller when called with non-NULL fourth argument. The implementation of ioctl_send_response() is the case. It should release the object explicitly. This commit fixes the bug.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Mar 27, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new medium vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
281e20323ab72180137824a298ee9e21e6f9acf6 < b2cd3947d116bb9ba7ff097b5fc747a8956764db 281e20323ab72180137824a298ee9e21e6f9acf6 < 356ff89acdbe6a66019154bc7eb2d300f5b15103 281e20323ab72180137824a298ee9e21e6f9acf6 < 53785fd9b315583cf029e39f72b73d23704a2253 281e20323ab72180137824a298ee9e21e6f9acf6 < d5a2dcee53fa6e6e2822f93cb3f1b0cd23163bee 281e20323ab72180137824a298ee9e21e6f9acf6 < 5f4543c9382ae2d5062f6aa4fecae0c9258d0b0e 281e20323ab72180137824a298ee9e21e6f9acf6 < c8bdc88216f09cb7387fedbdf613524367328616 281e20323ab72180137824a298ee9e21e6f9acf6 < 531390a243ef47448f8bad01c186c2787666bf4d
Linux / Linux
2.6.33

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/b2cd3947d116bb9ba7ff097b5fc747a8956764db git.kernel.org: https://git.kernel.org/stable/c/356ff89acdbe6a66019154bc7eb2d300f5b15103 git.kernel.org: https://git.kernel.org/stable/c/53785fd9b315583cf029e39f72b73d23704a2253 git.kernel.org: https://git.kernel.org/stable/c/d5a2dcee53fa6e6e2822f93cb3f1b0cd23163bee git.kernel.org: https://git.kernel.org/stable/c/5f4543c9382ae2d5062f6aa4fecae0c9258d0b0e git.kernel.org: https://git.kernel.org/stable/c/c8bdc88216f09cb7387fedbdf613524367328616 git.kernel.org: https://git.kernel.org/stable/c/531390a243ef47448f8bad01c186c2787666bf4d