First published: Mon Aug 15 2022(Updated: )
A use-after-free flaw was found in btrfs_get_dev_args_from_path in fs/btrfs/volumes.c in btrfs file-system in the Linux Kernel. In this flaw a local attacker with some special privilege may cause a system crash or a leak of internal kernel information. In btrfs_get_dev_args_from_path(), btrfs_get_bdev_and_sb() can fail if the path is invalid. In this case, btrfs_get_dev_args_from_path() returns directly without freeing args->uuid and args->fsid allocated before, which causes memory leaks. References: <a href="https://patchwork.kernel.org/project/linux-btrfs/patch/20220815151606.3479183-1-r33s3n6@gmail.com/">https://patchwork.kernel.org/project/linux-btrfs/patch/20220815151606.3479183-1-r33s3n6@gmail.com/</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/Kernel | <6.0 | 6.0 |
Linux kernel | <6.0 | |
Linux kernel | =6.0-rc1 | |
Linux kernel | =6.0-rc2 | |
Linux Kernel | <6.0 | |
Linux Kernel | =6.0-rc1 | |
Linux Kernel | =6.0-rc2 |
https://patchwork.kernel.org/project/linux-btrfs/patch/20220815151606.3479183-1-r33s3n6@gmail.com/
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-4394 has a severity rating that indicates it can lead to system crashes or kernel information leaks.
To mitigate CVE-2023-4394, upgrade the Linux Kernel to version 6.0 or later.
CVE-2023-4394 is caused by a use-after-free flaw in the btrfs file system's kernel code.
Local attackers with certain privileges can exploit CVE-2023-4394 to cause system disruptions.
CVE-2023-4394 affects versions of the Linux Kernel up to and including version 6.0.