7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.6 High
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
5.1%
In the Linux kernel, the following vulnerability has been resolved: bpf:
Defer the free of inner map when necessary When updating or deleting an
inner map in map array or map htab, the map may still be accessed by
non-sleepable program or sleepable program. However bpf_map_fd_put_ptr()
decreases the ref-counter of the inner map directly through bpf_map_put(),
if the ref-counter is the last one (which is true for most cases), the
inner map will be freed by ops->map_free() in a kworker. But for now, most
.map_free() callbacks don’t use synchronize_rcu() or its variants to wait
for the elapse of a RCU grace period, so after the invocation of
ops->map_free completes, the bpf program which is accessing the inner map
may incur use-after-free problem. Fix the free of inner map by invoking
bpf_map_free_deferred() after both one RCU grace period and one tasks trace
RCU grace period if the inner map has been removed from the outer map
before. The deferment is accomplished by using call_rcu() or
call_rcu_tasks_trace() when releasing the last ref-counter of bpf map. The
newly-added rcu_head field in bpf_map shares the same storage space with
work field to reduce the size of bpf_map.
Author | Note |
---|---|
Priority reason: Reported by Google kCTF | |
rodrigo-zaiden | USN-6765-1 for linux-oem-6.5 wrongly stated that this CVE was fixed in version 6.5.0-1022.23. The mentioned notice was revoked and the state of the fix for linux-oem-6.5 was recovered to the previous state. |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 22.04 | noarch | linux | < 5.15.0-112.122 | UNKNOWN |
ubuntu | 23.10 | noarch | linux | < 6.5.0-41.41 | UNKNOWN |
ubuntu | 24.04 | noarch | linux | < 6.8.0-7.7 | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < 5.15.0-1063.69 | UNKNOWN |
ubuntu | 23.10 | noarch | linux-aws | < 6.5.0-1021.21 | UNKNOWN |
ubuntu | 24.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws-5.15 | < 5.15.0-1063.69~20.04.1 | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws-6.5 | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-azure | < 5.15.0-1066.75 | UNKNOWN |
ubuntu | 23.10 | noarch | linux-azure | < 6.5.0-1022.23 | UNKNOWN |
git.kernel.org/stable/c/62fca83303d608ad4fec3f7428c8685680bb01b0
git.kernel.org/stable/c/876673364161da50eed6b472d746ef88242b2368
git.kernel.org/stable/c/bfd9b20c4862f41d4590fde11d70a5eeae53dcc5
git.kernel.org/stable/c/f91cd728b10c51f6d4a39957ccd56d1e802fc8ee
launchpad.net/bugs/cve/CVE-2023-52447
nvd.nist.gov/vuln/detail/CVE-2023-52447
security-tracker.debian.org/tracker/CVE-2023-52447
ubuntu.com/security/notices/USN-6688-1
ubuntu.com/security/notices/USN-6818-1
ubuntu.com/security/notices/USN-6818-2
ubuntu.com/security/notices/USN-6818-3
ubuntu.com/security/notices/USN-6818-4
ubuntu.com/security/notices/USN-6819-1
ubuntu.com/security/notices/USN-6819-2
ubuntu.com/security/notices/USN-6819-3
ubuntu.com/security/notices/USN-6819-4
ubuntu.com/security/notices/USN-6820-1
ubuntu.com/security/notices/USN-6820-2
ubuntu.com/security/notices/USN-6821-1
ubuntu.com/security/notices/USN-6821-2
ubuntu.com/security/notices/USN-6821-3
ubuntu.com/security/notices/USN-6821-4
ubuntu.com/security/notices/USN-6828-1
www.cve.org/CVERecord?id=CVE-2023-52447
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.6 High
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
5.1%