-

CVE-2023-53613

In the Linux kernel, the following vulnerability has been resolved:

dax: Fix dax_mapping_release() use after free

A CONFIG_DEBUG_KOBJECT_RELEASE test of removing a device-dax region
provider (like modprobe -r dax_hmem) yields:

 kobject: 'mapping0' (ffff93eb460e8800): kobject_release, parent 0000000000000000 (delayed 2000)
 [..]
 DEBUG_LOCKS_WARN_ON(1)
 WARNING: CPU: 23 PID: 282 at kernel/locking/lockdep.c:232 __lock_acquire+0x9fc/0x2260
 [..]
 RIP: 0010:__lock_acquire+0x9fc/0x2260
 [..]
 Call Trace:
  <TASK>
 [..]
  lock_acquire+0xd4/0x2c0
  ? ida_free+0x62/0x130
  _raw_spin_lock_irqsave+0x47/0x70
  ? ida_free+0x62/0x130
  ida_free+0x62/0x130
  dax_mapping_release+0x1f/0x30
  device_release+0x36/0x90
  kobject_delayed_cleanup+0x46/0x150

Due to attempting ida_free() on an ida object that has already been
freed. Devices typically only hold a reference on their parent while
registered. If a child needs a parent object to complete its release it
needs to hold a reference that it drops from its release callback.
Arrange for a dax_mapping to pin its parent dev_dax instance until
dax_mapping_release().

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < 94a85474f5e3e518bdbf8c9f51cb343d734a04f7
Version 0b07ce872a9eca1ff88c0eb7f6e92dde127d21ca
Status affected
Version < 9c2f993b6ca903c030d58451b5bf9ea27d0d17fa
Version 0b07ce872a9eca1ff88c0eb7f6e92dde127d21ca
Status affected
Version < 03859868ab82d57bfdd0cea1bf31f9319a5dded0
Version 0b07ce872a9eca1ff88c0eb7f6e92dde127d21ca
Status affected
Version < f76db6781d76d8464ec2faa9752cc3fb2e4f6923
Version 0b07ce872a9eca1ff88c0eb7f6e92dde127d21ca
Status affected
Version < 7310b84821f043dcf77d5e6aa0ad55dc1e10a11d
Version 0b07ce872a9eca1ff88c0eb7f6e92dde127d21ca
Status affected
Version < 6d24b170a9db0456f577b1ab01226a2254c016a8
Version 0b07ce872a9eca1ff88c0eb7f6e92dde127d21ca
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 5.10
Status affected
Version < 5.10
Version 0
Status unaffected
Version <= 5.10.*
Version 5.10.188
Status unaffected
Version <= 5.15.*
Version 5.15.121
Status unaffected
Version <= 6.1.*
Version 6.1.39
Status unaffected
Version <= 6.3.*
Version 6.3.13
Status unaffected
Version <= 6.4.*
Version 6.4.4
Status unaffected
Version <= *
Version 6.5
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.02% 0.053
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string