{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-09T05:16:48.042","vulnerabilities":[{"cve":{"id":"CVE-2023-52781","sourceIdentifier":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","published":"2024-05-21T16:15:17.023","lastModified":"2025-09-25T16:40:04.993","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nusb: config: fix iteration issue in 'usb_get_bos_descriptor()'\n\nThe BOS descriptor defines a root descriptor and is the base descriptor for\naccessing a family of related descriptors.\n\nFunction 'usb_get_bos_descriptor()' encounters an iteration issue when\nskipping the 'USB_DT_DEVICE_CAPABILITY' descriptor type. This results in\nthe same descriptor being read repeatedly.\n\nTo address this issue, a 'goto' statement is introduced to ensure that the\npointer and the amount read is updated correctly. This ensures that the\nfunction iterates to the next descriptor instead of reading the same\ndescriptor repeatedly."},{"lang":"es","value":" En el kernel de Linux, se resolvió la siguiente vulnerabilidad: usb: config: soluciona el problema de iteración en 'usb_get_bos_descriptor()'. El descriptor BOS define un descriptor raíz y es el descriptor base para acceder a una familia de descriptores relacionados. La función 'usb_get_bos_descriptor()' encuentra un problema de iteración al omitir el tipo de descriptor 'USB_DT_DEVICE_CAPABILITY'. Esto da como resultado que el mismo descriptor se lea repetidamente. Para solucionar este problema, se introduce una declaración 'goto' para garantizar que el puntero y la cantidad leída se actualicen correctamente. Esto garantiza que la función pase al siguiente descriptor en lugar de leer el mismo descriptor repetidamente."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":3.6}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-670"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.16.79","versionEndExcluding":"3.17","matchCriteriaId":"68F15D12-595E-4DC2-A392-DD4F77E9B1C7"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.4.194","versionEndExcluding":"4.5","matchCriteriaId":"D11EE928-C56E-49F1-866D-F32A20A2675E"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.9.194","versionEndExcluding":"4.10","matchCriteriaId":"2572FA5E-845E-4DF3-9D9C-8918ECC777C8"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.14.146","versionEndExcluding":"4.15","matchCriteriaId":"F1F3489C-0F08-4C44-9AFD-D45E286F51D3"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.19.75","versionEndExcluding":"4.20","matchCriteriaId":"5EC25515-A753-47F9-823B-4483BE60F328"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.2.17","versionEndExcluding":"5.3","matchCriteriaId":"C42AB381-30AB-4C50-8C95-A4BFAF431AFB"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.3.1","versionEndExcluding":"5.10.203","matchCriteriaId":"5309D07A-8B11-4B40-9E66-EA12D8A4960D"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.11","versionEndExcluding":"5.15.142","matchCriteriaId":"947082CA-E619-48E2-A36C-422D7BCA88EA"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.16","versionEndExcluding":"6.1.66","matchCriteriaId":"D7FD27D7-5533-4C5A-B886-777F07077420"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.2","versionEndExcluding":"6.6.4","matchCriteriaId":"86E0B7DD-2E2D-461D-996C-8E941AFE171F"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:6.7:rc1:*:*:*:*:*:*","matchCriteriaId":"3A0038DE-E183-4958-A6E3-CE3821FEAFBF"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:6.7:rc2:*:*:*:*:*:*","matchCriteriaId":"E31AD4FC-436C-44AB-BCAB-3A0B37F69EE0"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/64c27b7b2357ddb38b6afebaf46d5bff4d250702","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/7c0244cc311a4038505b73682b7c8ceaa5c7a8c8","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/974bba5c118f4c2baf00de0356e3e4f7928b4cbc","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/9ef94ec8e52eaf7b9abc5b5f8f5b911751112223","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/f89fef7710b2ba0f7a1e46594e530dcf2f77be91","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/64c27b7b2357ddb38b6afebaf46d5bff4d250702","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/7c0244cc311a4038505b73682b7c8ceaa5c7a8c8","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/974bba5c118f4c2baf00de0356e3e4f7928b4cbc","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/9ef94ec8e52eaf7b9abc5b5f8f5b911751112223","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/f89fef7710b2ba0f7a1e46594e530dcf2f77be91","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]}]}}]}