In the Linux kernel, the following vulnerability has been resolved:
dmaengine: fix NULL pointer in channel unregistration function
__dma_async_device_channel_register() can fail. In case of failure,
chan->local is freed (with free_percpu()), and chan->local is nullified.
When dma_async_device_unregister() is called (because of managed API or
intentionally by DMA controller driver), channels are unconditionally
unregistered, leading to this NULL pointer: [ 1.318693] Unable to handle
kernel NULL pointer dereference at virtual address 00000000000000d0 […] [
1.484499] Call trace: [ 1.486930] device_del+0x40/0x394 [ 1.490314]
device_unregister+0x20/0x7c [ 1.494220]
__dma_async_device_channel_unregister+0x68/0xc0 Look at
dma_async_device_register() function error path, channel device
unregistration is done only if chan->local is not NULL. Then add the same
condition at the beginning of __dma_async_device_channel_unregister()
function, to avoid NULL pointer issue whatever the API used to reach this
function.
Author | Note |
---|---|
rodrigo-zaiden | USN-6765-1 for linux-oem-6.5 wrongly stated that this CVE was fixed in version 6.5.0-1022.23. The mentioned notice was revoked and the state of the fix for linux-oem-6.5 was recovered to the previous state. |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < 5.15.0-106.116 | UNKNOWN |
ubuntu | 23.10 | noarch | linux | < 6.5.0-41.41 | UNKNOWN |
ubuntu | 24.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 14.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 16.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < 5.15.0-1061.67 | UNKNOWN |
git.kernel.org/linus/f5c24d94512f1b288262beda4d3dcb9629222fc7 (6.8-rc1)
git.kernel.org/stable/c/047fce470412ab64cb7345f9ff5d06919078ad79
git.kernel.org/stable/c/2ab32986a0b9e329eb7f8f04dd57cc127f797c08
git.kernel.org/stable/c/7f0ccfad2031eddcc510caf4e57f2d4aa2d8a50b
git.kernel.org/stable/c/9263fd2a63487c6d04cbb7b74a48fb12e1e352d0
git.kernel.org/stable/c/9de69732dde4e443c1c7f89acbbed2c45a6a8e17
git.kernel.org/stable/c/f5c24d94512f1b288262beda4d3dcb9629222fc7
launchpad.net/bugs/cve/CVE-2023-52492
nvd.nist.gov/vuln/detail/CVE-2023-52492
security-tracker.debian.org/tracker/CVE-2023-52492
ubuntu.com/security/notices/USN-6766-1
ubuntu.com/security/notices/USN-6766-2
ubuntu.com/security/notices/USN-6766-3
ubuntu.com/security/notices/USN-6795-1
ubuntu.com/security/notices/USN-6818-1
ubuntu.com/security/notices/USN-6818-2
ubuntu.com/security/notices/USN-6818-3
ubuntu.com/security/notices/USN-6818-4
ubuntu.com/security/notices/USN-6819-1
ubuntu.com/security/notices/USN-6819-2
ubuntu.com/security/notices/USN-6819-3
ubuntu.com/security/notices/USN-6819-4
ubuntu.com/security/notices/USN-6828-1
www.cve.org/CVERecord?id=CVE-2023-52492