In the Linux kernel, the following vulnerability has been resolved: nilfs2:
fix potential use after free in nilfs_gccache_submit_read_data() In
nilfs_gccache_submit_read_data(), brelse(bh) is called to drop the
reference count of bh when the call to nilfs_dat_translate() fails. If the
reference count hits 0 and its owner page gets unlocked, bh may be freed.
However, bh->b_page is dereferenced to put the page after that, which may
result in a use-after-free bug. This patch moves the release operation
after unlocking and putting the page. NOTE: The function in question is
only called in GC, and in combination with current userland tools, address
translation using DAT does not occur in that function, so the code path
that causes this issue will not be executed. However, it is possible to run
that code path by intentionally modifying the userland GC library or by
calling the GC ioctl directly. [[email protected]: NOTE added to
the commit log]
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | < 4.15.0-225.237 | UNKNOWN |
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 23.10 | noarch | linux | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 14.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 16.04 | noarch | linux | < 4.4.0-254.288 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < 4.15.0-1168.181 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < any | UNKNOWN |
git.kernel.org/linus/7ee29facd8a9c5a26079148e36bcf07141b3a6bc (6.6-rc4)
launchpad.net/bugs/cve/CVE-2023-52566
nvd.nist.gov/vuln/detail/CVE-2023-52566
security-tracker.debian.org/tracker/CVE-2023-52566
ubuntu.com/security/notices/USN-6777-1
ubuntu.com/security/notices/USN-6777-2
ubuntu.com/security/notices/USN-6777-3
ubuntu.com/security/notices/USN-6777-4
ubuntu.com/security/notices/USN-6778-1
www.cve.org/CVERecord?id=CVE-2023-52566