Lucene search

K
vulnrichmentLinuxVULNRICHMENT:CVE-2023-52646
HistoryApr 26, 2024 - 12:19 p.m.

CVE-2023-52646 aio: fix mremap after fork null-deref

2024-04-2612:19:32
Linux
github.com
5
linux kernel
vulnerability
aio
mremap
null-deref

AI Score

6.7

Confidence

Low

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

In the Linux kernel, the following vulnerability has been resolved:

aio: fix mremap after fork null-deref

Commit e4a0d3e720e7 (“aio: Make it possible to remap aio ring”) introduced
a null-deref if mremap is called on an old aio mapping after fork as
mm->ioctx_table will be set to NULL.

[[email protected]: fix 80 column issue]

CNA Affected

[
  {
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "vendor": "Linux",
    "product": "Linux",
    "versions": [
      {
        "status": "affected",
        "version": "e4a0d3e720e7",
        "lessThan": "808f1e4b5723",
        "versionType": "git"
      },
      {
        "status": "affected",
        "version": "e4a0d3e720e7",
        "lessThan": "d8dca1bfe9ad",
        "versionType": "git"
      },
      {
        "status": "affected",
        "version": "e4a0d3e720e7",
        "lessThan": "4326d0080f7e",
        "versionType": "git"
      },
      {
        "status": "affected",
        "version": "e4a0d3e720e7",
        "lessThan": "c261f798f7ba",
        "versionType": "git"
      },
      {
        "status": "affected",
        "version": "e4a0d3e720e7",
        "lessThan": "178993157e8c",
        "versionType": "git"
      },
      {
        "status": "affected",
        "version": "e4a0d3e720e7",
        "lessThan": "af126acf01a1",
        "versionType": "git"
      },
      {
        "status": "affected",
        "version": "e4a0d3e720e7",
        "lessThan": "81e9d6f86476",
        "versionType": "git"
      }
    ],
    "programFiles": [
      "fs/aio.c"
    ],
    "defaultStatus": "unaffected"
  },
  {
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "vendor": "Linux",
    "product": "Linux",
    "versions": [
      {
        "status": "affected",
        "version": "3.19"
      },
      {
        "status": "unaffected",
        "version": "0",
        "lessThan": "3.19",
        "versionType": "custom"
      },
      {
        "status": "unaffected",
        "version": "4.14.306",
        "versionType": "custom",
        "lessThanOrEqual": "4.14.*"
      },
      {
        "status": "unaffected",
        "version": "4.19.273",
        "versionType": "custom",
        "lessThanOrEqual": "4.19.*"
      },
      {
        "status": "unaffected",
        "version": "5.4.232",
        "versionType": "custom",
        "lessThanOrEqual": "5.4.*"
      },
      {
        "status": "unaffected",
        "version": "5.10.169",
        "versionType": "custom",
        "lessThanOrEqual": "5.10.*"
      },
      {
        "status": "unaffected",
        "version": "5.15.95",
        "versionType": "custom",
        "lessThanOrEqual": "5.15.*"
      },
      {
        "status": "unaffected",
        "version": "6.1.13",
        "versionType": "custom",
        "lessThanOrEqual": "6.1.*"
      },
      {
        "status": "unaffected",
        "version": "6.2",
        "versionType": "original_commit_for_fix",
        "lessThanOrEqual": "*"
      }
    ],
    "programFiles": [
      "fs/aio.c"
    ],
    "defaultStatus": "affected"
  }
]

AI Score

6.7

Confidence

Low

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial