CVE-2023-52852
Severity CVSS v4.0:
Pending analysis
Type:
CWE-416
Use After Free
Publication date:
21/05/2024
Last modified:
30/12/2024
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
f2fs: compress: fix to avoid use-after-free on dic<br />
<br />
Call trace:<br />
__memcpy+0x128/0x250<br />
f2fs_read_multi_pages+0x940/0xf7c<br />
f2fs_mpage_readpages+0x5a8/0x624<br />
f2fs_readahead+0x5c/0x110<br />
page_cache_ra_unbounded+0x1b8/0x590<br />
do_sync_mmap_readahead+0x1dc/0x2e4<br />
filemap_fault+0x254/0xa8c<br />
f2fs_filemap_fault+0x2c/0x104<br />
__do_fault+0x7c/0x238<br />
do_handle_mm_fault+0x11bc/0x2d14<br />
do_mem_abort+0x3a8/0x1004<br />
el0_da+0x3c/0xa0<br />
el0t_64_sync_handler+0xc4/0xec<br />
el0t_64_sync+0x1b4/0x1b8<br />
<br />
In f2fs_read_multi_pages(), once f2fs_decompress_cluster() was called if<br />
we hit cached page in compress_inode&#39;s cache, dic may be released, it needs<br />
break the loop rather than continuing it, in order to avoid accessing<br />
invalid dic pointer.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.13.19 (including) | 5.15.139 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.63 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.5.12 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.6 (including) | 6.6.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/8c4504cc0c64862740a6acb301e0cfa59580dbc5
- https://git.kernel.org/stable/c/932ddb5c29e884cc6fac20417ece72ba4a35c401
- https://git.kernel.org/stable/c/9375ea7f269093d7c884857ae1f47633a91f429c
- https://git.kernel.org/stable/c/9d065aa52b6ee1b06f9c4eca881c9b4425a12ba2
- https://git.kernel.org/stable/c/b0327c84e91a0f4f0abced8cb83ec86a7083f086
- https://git.kernel.org/stable/c/8c4504cc0c64862740a6acb301e0cfa59580dbc5
- https://git.kernel.org/stable/c/932ddb5c29e884cc6fac20417ece72ba4a35c401
- https://git.kernel.org/stable/c/9375ea7f269093d7c884857ae1f47633a91f429c
- https://git.kernel.org/stable/c/9d065aa52b6ee1b06f9c4eca881c9b4425a12ba2
- https://git.kernel.org/stable/c/b0327c84e91a0f4f0abced8cb83ec86a7083f086



