Bug 2265794 (CVE-2023-52458)
Summary: | CVE-2023-52458 kernel: block: null pointer dereference in ioctl.c when length and logical block size are misaligned | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Patrick Del Bello <pdelbell> |
Component: | vulnerability | Assignee: | Product Security <prodsec-ir-bot> |
Status: | NEW --- | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | acaringi, allarkin, aquini, bhu, chwhite, cye, cyin, dbohanno, debarbos, dfreiber, drow, dvlasenk, esandeen, ezulian, hkrzesin, jarod, jburrell, jdenham, jfaracco, jforbes, jlelli, joe.lawrence, jshortt, jstancek, jwyatt, kcarcia, kyoshida, ldoskova, lgoncalv, lzampier, mleitner, mmilgram, mstowell, nmurray, ptalbert, rparrazo, rrobaina, rvrbovsk, rysulliv, scweaver, sukulkar, tglozar, tyberry, vkumar, wcosta, williams, wmealing, ycote, ykopkova, zhijwang |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | kernel 6.8-rc1 | Doc Type: | If docs needed, set a value |
Doc Text: |
A flaw was found in the Linux kernel's block subsystem, where a NULL pointer dereference occurs if partitions are created or resized with a size that is not a multiple of the logical block size. This flaw allows a privileged attacker to cause a denial of service.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | Type: | --- | |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2265806 | ||
Bug Blocks: | 2265790 |
Description
Patrick Del Bello
2024-02-24 11:20:03 UTC
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 2265806] Fixed in 5.15.148 with commit 5010c2712096 Fixed in 6.1.75 with commit ef31cc877947 Fixed in 6.6.14 with commit cb16cc1abda1 Fixed in 6.7.2 with commit bcdc288e7bc0 Fixed in 6.8-rc1 with commit 6f64f866aa1a This was fixed for Fedora with the 6.6.14 stable kernel updates. The result of automatic check (that is developed by Alexander Larkin) for this CVE-2023-52458 is: CHECK Maybe valid. Check manually. with impact MODERATE (that is approximation based on flags NULLPTR DISK SIMPLEFIX LOG IMPROVEONLY ; these flags parsed automatically based on patche data). Such automatic check happens only for Low/Moderates (and only when not from reporter, but parsing already existing CVE). Highs always checked manually (I check it myself and then we check it again in Remediation team). In rare cases some of the Moderates could be increased to High later. This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2024:4928 https://access.redhat.com/errata/RHSA-2024:4928 This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Extended Update Support Via RHSA-2024:5067 https://access.redhat.com/errata/RHSA-2024:5067 This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Extended Update Support Via RHSA-2024:5066 https://access.redhat.com/errata/RHSA-2024:5066 |