Bug 2277789 (CVE-2023-52646)
| Summary: | CVE-2023-52646 kernel: aio: fix mremap after fork null-deref | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | Zack Miele <zmiele> |
| Component: | vulnerability | Assignee: | Product Security <prodsec-ir-bot> |
| Status: | NEW --- | QA Contact: | |
| Severity: | medium | Docs Contact: | |
| Priority: | medium | ||
| Version: | unspecified | CC: | acaringi, allarkin, aquini, bhu, chwhite, cye, cyin, dbohanno, debarbos, dfreiber, drow, dvlasenk, esandeen, ezulian, hkrzesin, jarod, jburrell, jdenham, jfaracco, jlelli, joe.lawrence, jshortt, jstancek, jwyatt, kcarcia, ldoskova, lgoncalv, lzampier, mbenatto, mleitner, mmilgram, mstowell, nmurray, ptalbert, rparrazo, rrobaina, rvrbovsk, scweaver, sidakwo, sukulkar, tglozar, vkumar, wcosta, williams, wmealing, ycote, ykopkova, zhijwang |
| Target Milestone: | --- | Keywords: | Security |
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | kernel 4.14.306, kernel 4.19.273, kernel 5.4.232, kernel 5.10.169, kernel 5.15.95, kernel 6.1.13, kernel 6.2 | Doc Type: | If docs needed, set a value |
| Doc Text: |
A flaw was found in the Linux kernel’s Asynchronous I/O (AIO) subsystem. The issue arises due to a NULL pointer dereference (null-deref) when using the mremap() function after a fork operation, specifically on old AIO mappings. The vulnerability occurs because the ioctx_table is set to NULL after the fork, leading to the potential for system crashes when mremap() is called on these outdated mappings.
The problem was introduced in Linux kernel version 3.19 and affected various versions up to 6.2, depending on the specific kernel. It was fixed across several versions, including 4.14.306, 4.19.273, 5.4.232, and 6.1.13.
To mitigate this issue, it is recommended to update to the patched kernel versions. The CVSS score for this vulnerability is 5.5, indicating a medium severity, with potential impacts on system availability due to possible crashes triggered by this null pointer dereference.
|
Story Points: | --- |
| Clone Of: | Environment: | ||
| Last Closed: | Type: | --- | |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | |||
| Bug Blocks: | 2277879 | ||
|
Description
Zack Miele
2024-04-29 15:37:17 UTC
The result of automatic check (that is developed by Alexander Larkin) for this CVE-2023-52646 is: CHECK Maybe valid. Check manually. with impact MODERATE (that is approximation based on flags DISK SIMPLEFIX ; these flags parsed automatically based on patche data). Such automatic check happens only for Low/Moderates (and only when not from reporter, but parsing already existing CVE). Highs always checked manually (I check it myself and then we check it again in Remediation team). In rare cases some of the Moderates could be increased to High later. |