First published: Thu Mar 23 2023(Updated: )
A slab-use-after-free read flaw was found in btrfs_search_slot in fs/btrfs/ctree.c The quota assigned ioctl can currently run in parallel with a quota disable ioctl call. The assign ioctl uses the quota root, while the disable ioctl frees that root, and therefore we can have a use-after-free triggered in the assign ioctl. Reference: <a href="https://lore.kernel.org/linux-btrfs/35b9a70650ea947387cf352914a8774b4f7e8a6f.1679481128.git.fdmanana@suse.com/">https://lore.kernel.org/linux-btrfs/35b9a70650ea947387cf352914a8774b4f7e8a6f.1679481128.git.fdmanana@suse.com/</a>
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <5.10.177 | 5.10.177 |
redhat/kernel | <5.15.106 | 5.15.106 |
redhat/kernel | <6.1.23 | 6.1.23 |
redhat/kernel | <6.2.10 | 6.2.10 |
Fedora | =36 | |
Fedora | =37 | |
Linux kernel | >=2.6.13<5.10.177 | |
Linux kernel | >=5.15<5.15.106 | |
Linux kernel | >=6.1<6.1.23 | |
Linux kernel | >=6.2<6.2.10 | |
Linux kernel | =2.6.12-rc2 | |
Linux kernel | =2.6.12-rc3 | |
Linux kernel | =2.6.12-rc4 | |
Linux kernel | =2.6.12-rc5 | |
Linux kernel | =2.6.12-rc6 | |
Linux kernel | =6.3 | |
Linux kernel | =6.3-rc1 | |
Linux kernel | =6.3-rc2 | |
Linux kernel | =6.3-rc3 | |
Linux kernel | =6.3-rc4 | |
Linux kernel | =6.3-rc5 | |
Linux Kernel | >=2.6.13<5.10.177 | |
Linux Kernel | >=5.15<5.15.106 | |
Linux Kernel | >=6.1<6.1.23 | |
Linux Kernel | >=6.2<6.2.10 | |
Linux Kernel | =2.6.12-rc2 | |
Linux Kernel | =2.6.12-rc3 | |
Linux Kernel | =2.6.12-rc4 | |
Linux Kernel | =2.6.12-rc5 | |
Linux Kernel | =2.6.12-rc6 | |
Linux Kernel | =6.3 | |
Linux Kernel | =6.3-rc1 | |
Linux Kernel | =6.3-rc2 | |
Linux Kernel | =6.3-rc3 | |
Linux Kernel | =6.3-rc4 | |
Linux Kernel | =6.3-rc5 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.16-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-1611 is classified as a critical vulnerability due to its potential for a use-after-free condition that can be exploited.
To mitigate CVE-2023-1611, update your kernel to the latest version specified in the remediation documents from your Linux distribution.
CVE-2023-1611 affects various Linux kernel versions, including kernels up to 5.10.177, 5.15.106, 6.1.23, and 6.2.10.
CVE-2023-1611 is a slab-use-after-free read vulnerability that can lead to memory access violations.
Yes, CVE-2023-1611 has had discussions and references in exploit communities, but specific proof of concept details may vary.