First published: Fri May 17 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: net: atlantic: eliminate double free in error handling logic Driver has a logic leak in ring data allocation/free, where aq_ring_free could be called multiple times on same ring, if system is under stress and got memory allocation error. Ring pointer was used as an indicator of failure, but this is not correct since only ring data is allocated/deallocated. Ring itself is an array member. Changing ring allocation functions to return error code directly. This simplifies error handling and eliminates aq_ring_free on higher layer.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <6.1.77 | 6.1.77 |
redhat/kernel | <6.6.16 | 6.6.16 |
redhat/kernel | <6.7.4 | 6.7.4 |
redhat/kernel | <6.8 | 6.8 |
Linux Kernel | <6.1.77 | |
Linux Kernel | >=6.2<6.6.16 | |
Linux Kernel | >=6.7<6.7.4 | |
debian/linux | <=5.10.223-1<=5.10.226-1 | 6.1.123-1 6.1.119-1 6.12.10-1 6.12.11-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-52664 has a severity rating that indicates it could lead to a denial of service due to double free issues in the Linux kernel.
To mitigate CVE-2023-52664, update the kernel to versions 6.1.77, 6.6.16, 6.7.4, or 6.8 for Red Hat systems or to 5.10.223-1 or 5.10.226-1 for Debian systems.
CVE-2023-52664 affects Linux kernel versions prior to 6.1.77, between 6.2 and 6.6.16, and between 6.7 and 6.7.4.
Exploitation of CVE-2023-52664 may lead to denial of service conditions, impacting system stability and availability.
Currently, the recommended approach to address CVE-2023-52664 is to apply the relevant security patches as there are no official workarounds.