In the Linux kernel, the following vulnerability has been resolved:
mctp: perform route lookups under a RCU read-side lock
Our current route lookups (mctp_route_lookup and mctp_route_lookup_null)
traverse the net's route list without the RCU read lock held. This means
the route lookup is subject to preemption, resulting in an potential
grace period expiry, and so an eventual kfree() while we still have the
route pointer.
Add the proper read-side critical section locks around the route
lookups, preventing premption and a possible parallel kfree.
The remaining net->mctp.routes accesses are already under a
rcu_read_lock, or protected by the RTNL for updates.
Based on an analysis from Sili Luo <rootlab@huawei.com>, where
introducing a delay in the route lookup could cause a UAF on
simultaneous sendmsg() and route deletion.
References
Configurations
Configuration 1 (hide)
|
History
13 Jan 2025, 17:53
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/1db0724a01b558feb1ecae551782add1951a114a - Patch | |
References | () https://git.kernel.org/stable/c/2405f64a95a7a094eb24cba9bcfaffd1ea264de4 - Patch | |
References | () https://git.kernel.org/stable/c/5093bbfc10ab6636b32728e35813cbd79feb063c - Patch | |
References | () https://git.kernel.org/stable/c/6c52b12159049046483fdb0c411a0a1869c41a67 - Patch | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
CPE | cpe:2.3:o:linux:linux_kernel:6.6:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.6:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.6:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.6:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.6:rc1:*:*:*:*:*:* |
|
First Time |
Linux linux Kernel
Linux |
|
CWE | CWE-416 |
21 Nov 2024, 08:39
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/1db0724a01b558feb1ecae551782add1951a114a - | |
References | () https://git.kernel.org/stable/c/2405f64a95a7a094eb24cba9bcfaffd1ea264de4 - | |
References | () https://git.kernel.org/stable/c/5093bbfc10ab6636b32728e35813cbd79feb063c - | |
References | () https://git.kernel.org/stable/c/6c52b12159049046483fdb0c411a0a1869c41a67 - |
29 Feb 2024, 06:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-29 06:15
Updated : 2025-01-13 17:53
NVD link : CVE-2023-52483
Mitre link : CVE-2023-52483
CVE.ORG link : CVE-2023-52483
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free