First published: Tue May 21 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: nbd: fix uaf in nbd_open Commit 4af5f2e03013 ("nbd: use blk_mq_alloc_disk and blk_cleanup_disk") cleans up disk by blk_cleanup_disk() and it won't set disk->private_data as NULL as before. UAF may be triggered in nbd_open() if someone tries to open nbd device right after nbd_put() since nbd has been free in nbd_dev_remove(). Fix this by implementing ->free_disk and free private data in it.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <6.1.63 | 6.1.63 |
redhat/kernel | <6.5.12 | 6.5.12 |
redhat/kernel | <6.6.2 | 6.6.2 |
redhat/kernel | <6.7 | 6.7 |
Linux Kernel | >=5.14<6.1.63 | |
Linux Kernel | >=6.2<6.5.12 | |
Linux Kernel | >=6.6<6.6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-52837 has a high severity level due to the potential for a use-after-free vulnerability in the Linux kernel.
To fix CVE-2023-52837, upgrade your Linux kernel to version 6.1.63, 6.5.12, 6.6.2, or 6.7 as applicable.
CVE-2023-52837 affects Linux kernel versions prior to 6.1.63, 6.5.12, 6.6.2, and 6.7.
While specific exploits for CVE-2023-52837 are not publicly documented, use-after-free vulnerabilities typically pose a risk of exploitation.
The potential impacts of CVE-2023-52837 include system crashes, data corruption, and unauthorized access to sensitive information.