First published: Thu Feb 29 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: mctp: perform route lookups under a RCU read-side lock Our current route lookups (mctp_route_lookup and mctp_route_lookup_null) traverse the net's route list without the RCU read lock held. This means the route lookup is subject to preemption, resulting in an potential grace period expiry, and so an eventual kfree() while we still have the route pointer. Add the proper read-side critical section locks around the route lookups, preventing premption and a possible parallel kfree. The remaining net->mctp.routes accesses are already under a rcu_read_lock, or protected by the RTNL for updates. Based on an analysis from Sili Luo <rootlab@huawei.com>, where introducing a delay in the route lookup could cause a UAF on simultaneous sendmsg() and route deletion.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=5.15<5.15.137 | |
Linux Kernel | >=5.16<6.1.59 | |
Linux Kernel | >=6.2<6.5.8 | |
Linux Kernel | =6.6-rc1 | |
Linux Kernel | =6.6-rc2 | |
Linux Kernel | =6.6-rc3 | |
Linux Kernel | =6.6-rc4 | |
Linux Kernel | =6.6-rc5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-52483 is classified as medium, impacting the integrity of the Linux kernel's route lookups.
To fix CVE-2023-52483, update your Linux kernel to the latest version that includes the patch provided for this vulnerability.
CVE-2023-52483 affects Linux kernel versions from 5.15 to 6.6-rc5.
CVE-2023-52483 is a vulnerability related to improper route lookup handling in the Linux kernel.
There is no recommended workaround for CVE-2023-52483 besides applying the appropriate kernel updates.