CVE-2023-52483

Severity CVSS v4.0:
Pending analysis
Type:
CWE-416 Use After Free
Publication date:
29/02/2024
Last modified:
13/01/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> mctp: perform route lookups under a RCU read-side lock<br /> <br /> Our current route lookups (mctp_route_lookup and mctp_route_lookup_null)<br /> traverse the net&amp;#39;s route list without the RCU read lock held. This means<br /> the route lookup is subject to preemption, resulting in an potential<br /> grace period expiry, and so an eventual kfree() while we still have the<br /> route pointer.<br /> <br /> Add the proper read-side critical section locks around the route<br /> lookups, preventing premption and a possible parallel kfree.<br /> <br /> The remaining net-&gt;mctp.routes accesses are already under a<br /> rcu_read_lock, or protected by the RTNL for updates.<br /> <br /> Based on an analysis from Sili Luo , where<br /> introducing a delay in the route lookup could cause a UAF on<br /> simultaneous sendmsg() and route deletion.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.15 (including) 5.15.137 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.59 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.5.8 (excluding)
cpe:2.3:o:linux:linux_kernel:6.6:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc5:*:*:*:*:*:*