In the Linux kernel, the following vulnerability has been resolved: net:
atlantic: eliminate double free in error handling logic Driver has a logic
leak in ring data allocation/free, where aq_ring_free could be called
multiple times on same ring, if system is under stress and got memory
allocation error. Ring pointer was used as an indicator of failure, but
this is not correct since only ring data is allocated/deallocated. Ring
itself is an array member. Changing ring allocation functions to return
error code directly. This simplifies error handling and eliminates
aq_ring_free on higher layer.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 23.10 | noarch | linux | < 6.5.0-41.41 | UNKNOWN |
ubuntu | 24.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 14.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 16.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < any | UNKNOWN |
git.kernel.org/linus/b3cb7a830a24527877b0bc900b9bd74a96aea928 (6.8-rc1)
git.kernel.org/stable/c/0edb3ae8bfa31cd544b0c195bdec00e036002b5d
git.kernel.org/stable/c/b3cb7a830a24527877b0bc900b9bd74a96aea928
git.kernel.org/stable/c/c11a870a73a3bc4cc7df6dd877a45b181795fcbf
git.kernel.org/stable/c/d1fde4a7e1dcc4d49cce285107a7a43c3030878d
launchpad.net/bugs/cve/CVE-2023-52664
nvd.nist.gov/vuln/detail/CVE-2023-52664
security-tracker.debian.org/tracker/CVE-2023-52664
ubuntu.com/security/notices/USN-6818-1
ubuntu.com/security/notices/USN-6818-2
ubuntu.com/security/notices/USN-6818-3
ubuntu.com/security/notices/USN-6818-4
ubuntu.com/security/notices/USN-6819-1
ubuntu.com/security/notices/USN-6819-2
ubuntu.com/security/notices/USN-6819-3
www.cve.org/CVERecord?id=CVE-2023-52664