-

CVE-2023-53189

In the Linux kernel, the following vulnerability has been resolved:

ipv6/addrconf: fix a potential refcount underflow for idev

Now in addrconf_mod_rs_timer(), reference idev depends on whether
rs_timer is not pending. Then modify rs_timer timeout.

There is a time gap in [1], during which if the pending rs_timer
becomes not pending. It will miss to hold idev, but the rs_timer
is activated. Thus rs_timer callback function addrconf_rs_timer()
will be executed and put idev later without holding idev. A refcount
underflow issue for idev can be caused by this.

	if (!timer_pending(&idev->rs_timer))
		in6_dev_hold(idev);
		  <--------------[1]
	mod_timer(&idev->rs_timer, jiffies + when);

To fix the issue, hold idev if mod_timer() return 0.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < c6395e32935d35e6f935e7caf1c2dac5a95943b4
Version b7b1bfce0bb68bd8f6e62a28295922785cc63781
Status affected
Version < df62fdcd004afa72ecbed0e862ebb983acd3aa57
Version b7b1bfce0bb68bd8f6e62a28295922785cc63781
Status affected
Version < c7eeba47058532f6077d6a658e38b6698f6ae71a
Version b7b1bfce0bb68bd8f6e62a28295922785cc63781
Status affected
Version < 2ad31ce40e8182860b631e37209e93e543790b7c
Version b7b1bfce0bb68bd8f6e62a28295922785cc63781
Status affected
Version < 82abd1c37d3bf2a2658b34772c17a25a6f9cca42
Version b7b1bfce0bb68bd8f6e62a28295922785cc63781
Status affected
Version < 436b7cc7eae7851c184b671ed7a4a64c750b86f7
Version b7b1bfce0bb68bd8f6e62a28295922785cc63781
Status affected
Version < 1f656e483eb4733d62f18dfb206a49b78f60f495
Version b7b1bfce0bb68bd8f6e62a28295922785cc63781
Status affected
Version < 06a0716949c22e2aefb648526580671197151acc
Version b7b1bfce0bb68bd8f6e62a28295922785cc63781
Status affected
Version 973d5956f754cfc306f5e274d71503498f4b0324
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 3.11
Status affected
Version < 3.11
Version 0
Status unaffected
Version <= 4.14.*
Version 4.14.322
Status unaffected
Version <= 4.19.*
Version 4.19.291
Status unaffected
Version <= 5.4.*
Version 5.4.251
Status unaffected
Version <= 5.10.*
Version 5.10.188
Status unaffected
Version <= 5.15.*
Version 5.15.121
Status unaffected
Version <= 6.1.*
Version 6.1.40
Status unaffected
Version <= 6.4.*
Version 6.4.5
Status unaffected
Version <= *
Version 6.5
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.03% 0.078
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string