CVE-2023-52483

In the Linux kernel, the following vulnerability has been resolved: mctp: perform route lookups under a RCU read-side lock Our current route lookups (mctp_route_lookup and mctp_route_lookup_null) traverse the net's route list without the RCU read lock held. This means the route lookup is subject to preemption, resulting in an potential grace period expiry, and so an eventual kfree() while we still have the route pointer. Add the proper read-side critical section locks around the route lookups, preventing premption and a possible parallel kfree. The remaining net->mctp.routes accesses are already under a rcu_read_lock, or protected by the RTNL for updates. Based on an analysis from Sili Luo <rootlab@huawei.com>, where introducing a delay in the route lookup could cause a UAF on simultaneous sendmsg() and route deletion.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc5:*:*:*:*:*:*

History

13 Jan 2025, 17:53

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/1db0724a01b558feb1ecae551782add1951a114a - () https://git.kernel.org/stable/c/1db0724a01b558feb1ecae551782add1951a114a - Patch
References () https://git.kernel.org/stable/c/2405f64a95a7a094eb24cba9bcfaffd1ea264de4 - () https://git.kernel.org/stable/c/2405f64a95a7a094eb24cba9bcfaffd1ea264de4 - Patch
References () https://git.kernel.org/stable/c/5093bbfc10ab6636b32728e35813cbd79feb063c - () https://git.kernel.org/stable/c/5093bbfc10ab6636b32728e35813cbd79feb063c - Patch
References () https://git.kernel.org/stable/c/6c52b12159049046483fdb0c411a0a1869c41a67 - () https://git.kernel.org/stable/c/6c52b12159049046483fdb0c411a0a1869c41a67 - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CPE cpe:2.3:o:linux:linux_kernel:6.6:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc1:*:*:*:*:*:*
First Time Linux linux Kernel
Linux
CWE CWE-416

21 Nov 2024, 08:39

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/1db0724a01b558feb1ecae551782add1951a114a - () https://git.kernel.org/stable/c/1db0724a01b558feb1ecae551782add1951a114a -
References () https://git.kernel.org/stable/c/2405f64a95a7a094eb24cba9bcfaffd1ea264de4 - () https://git.kernel.org/stable/c/2405f64a95a7a094eb24cba9bcfaffd1ea264de4 -
References () https://git.kernel.org/stable/c/5093bbfc10ab6636b32728e35813cbd79feb063c - () https://git.kernel.org/stable/c/5093bbfc10ab6636b32728e35813cbd79feb063c -
References () https://git.kernel.org/stable/c/6c52b12159049046483fdb0c411a0a1869c41a67 - () https://git.kernel.org/stable/c/6c52b12159049046483fdb0c411a0a1869c41a67 -

29 Feb 2024, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-29 06:15

Updated : 2025-01-13 17:53


NVD link : CVE-2023-52483

Mitre link : CVE-2023-52483

CVE.ORG link : CVE-2023-52483


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free