First published: Tue Feb 20 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: uio: Fix use-after-free in uio_open core-1 core-2 ------------------------------------------------------- uio_unregister_device uio_open idev = idr_find() device_unregister(&idev->dev) put_device(&idev->dev) uio_device_release get_device(&idev->dev) kfree(idev) uio_free_minor(minor) uio_release put_device(&idev->dev) kfree(idev) ------------------------------------------------------- In the core-1 uio_unregister_device(), the device_unregister will kfree idev when the idev->dev kobject ref is 1. But after core-1 device_unregister, put_device and before doing kfree, the core-2 may get_device. Then: 1. After core-1 kfree idev, the core-2 will do use-after-free for idev. 2. When core-2 do uio_release and put_device, the idev will be double freed. To address this issue, we can get idev atomic & inc idev reference with minor_lock. <a href="https://git.kernel.org/stable/c/0c9ae0b8605078eafc3bea053cc78791e97ba2e2">https://git.kernel.org/stable/c/0c9ae0b8605078eafc3bea053cc78791e97ba2e2</a> <a href="https://git.kernel.org/stable/c/17a8519cb359c3b483fb5c7367efa9a8a508bdea">https://git.kernel.org/stable/c/17a8519cb359c3b483fb5c7367efa9a8a508bdea</a> <a href="https://git.kernel.org/stable/c/3174e0f7de1ba392dc191625da83df02d695b60c">https://git.kernel.org/stable/c/3174e0f7de1ba392dc191625da83df02d695b60c</a> <a href="https://git.kernel.org/stable/c/35f102607054faafe78d2a6994b18d5d9d6e92ad">https://git.kernel.org/stable/c/35f102607054faafe78d2a6994b18d5d9d6e92ad</a> <a href="https://git.kernel.org/stable/c/5cf604ee538ed0c467abe3b4cda5308a6398f0f7">https://git.kernel.org/stable/c/5cf604ee538ed0c467abe3b4cda5308a6398f0f7</a> <a href="https://git.kernel.org/stable/c/5e0be1229ae199ebb90b33102f74a0f22d152570">https://git.kernel.org/stable/c/5e0be1229ae199ebb90b33102f74a0f22d152570</a> <a href="https://git.kernel.org/stable/c/913205930da6213305616ac539447702eaa85e41">https://git.kernel.org/stable/c/913205930da6213305616ac539447702eaa85e41</a> <a href="https://git.kernel.org/stable/c/e93da893d52d82d57fc0db2ca566024e0f26ff50">https://git.kernel.org/stable/c/e93da893d52d82d57fc0db2ca566024e0f26ff50</a>
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >4.18.0<4.19.306 | |
Linux Kernel | >=4.20.0<5.4.268 | |
Linux Kernel | >=5.5.0<5.10.209 | |
Linux Kernel | >=5.11.0<5.15.148 | |
Linux Kernel | >=5.16.0<6.1.74 | |
Linux Kernel | >=6.2.0<6.6.13 | |
Linux Kernel | >=6.7.0<6.7.1 | |
Linux Kernel | =4.18 | |
Linux Kernel | =4.18-rc5 | |
Linux Kernel | =4.18-rc6 | |
Linux Kernel | =4.18-rc7 | |
Linux Kernel | =4.18-rc8 | |
IBM Security Verify Governance - Identity Manager | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager Software Stack | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager Virtual Appliance | <=ISVG 10.0.2 | |
IBM Security Verify Governance Identity Manager Container | <=ISVG 10.0.2 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.128-1 6.12.21-1 6.12.22-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-52439 has a moderate severity level due to its potential for a use-after-free vulnerability in the Linux kernel.
To fix CVE-2023-52439, upgrade to a patched version of the Linux kernel such as 5.10.223-1 or higher.
CVE-2023-52439 affects Linux kernel versions from 4.18.0 to 6.6.13, excluding version 5.10.223 and higher.
CVE-2023-52439 may allow local users to gain elevated privileges, but it does not appear to be exploitable remotely.
CVE-2023-52439 impacts the User Input/Output (uio) subsystem within the Linux kernel.