-

CVE-2023-53484

In the Linux kernel, the following vulnerability has been resolved:

lib: cpu_rmap: Avoid use after free on rmap->obj array entries

When calling irq_set_affinity_notifier() with NULL at the notify
argument, it will cause freeing of the glue pointer in the
corresponding array entry but will leave the pointer in the array. A
subsequent call to free_irq_cpu_rmap() will try to free this entry again
leading to possible use after free.

Fix that by setting NULL to the array entry and checking that we have
non-zero at the array entry when iterating over the array in
free_irq_cpu_rmap().

The current code does not suffer from this since there are no cases
where irq_set_affinity_notifier(irq, NULL) (note the NULL passed for the
notify arg) is called, followed by a call to free_irq_cpu_rmap() so we
don't hit and issue. Subsequent patches in this series excersize this
flow, hence the required fix.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < 981f339d2905b6a92ef59358158b326493aecac5
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < d1308bd0b24cb1d78fa2747d5fa3e055cc628a48
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < cc2d2b3dbfb0ba57bc027fb7e1121250c50e4000
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < f748e15253833b771acbede14ea98f50831ac289
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < c6ed54dd90698dc0744d669524cc1c122ded8a16
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < c9115f49cf260d24d8b5f2d9a4b63cb31a627bb4
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 67bca5f1d644f4e79b694abd8052a177de81c37f
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 4e0473f1060aa49621d40a113afde24818101d37
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version <= 4.14.*
Version 4.14.316
Status unaffected
Version <= 4.19.*
Version 4.19.284
Status unaffected
Version <= 5.4.*
Version 5.4.244
Status unaffected
Version <= 5.10.*
Version 5.10.181
Status unaffected
Version <= 5.15.*
Version 5.15.113
Status unaffected
Version <= 6.1.*
Version 6.1.30
Status unaffected
Version <= 6.3.*
Version 6.3.4
Status unaffected
Version <= *
Version 6.4
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.03% 0.081
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string