CVE-2023-52846

In the Linux kernel, the following vulnerability has been resolved: hsr: Prevent use after free in prp_create_tagged_frame() The prp_fill_rct() function can fail. In that situation, it frees the skb and returns NULL. Meanwhile on the success path, it returns the original skb. So it's straight forward to fix bug by using the returned value.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

31 Dec 2024, 20:00

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/1787b9f0729d318d67cf7c5a95f0c3dba9a7cc18 - () https://git.kernel.org/stable/c/1787b9f0729d318d67cf7c5a95f0c3dba9a7cc18 - Patch
References () https://git.kernel.org/stable/c/6086258bd5ea7b5c706ff62da42b8e271b2401db - () https://git.kernel.org/stable/c/6086258bd5ea7b5c706ff62da42b8e271b2401db - Patch
References () https://git.kernel.org/stable/c/876f8ab52363f649bcc74072157dfd7adfbabc0d - () https://git.kernel.org/stable/c/876f8ab52363f649bcc74072157dfd7adfbabc0d - Patch
References () https://git.kernel.org/stable/c/a1a485e45d24b1cd8fe834fd6f1b06e2903827da - () https://git.kernel.org/stable/c/a1a485e45d24b1cd8fe834fd6f1b06e2903827da - Patch
References () https://git.kernel.org/stable/c/d103fb6726904e353b4773188ee3d3acb4078363 - () https://git.kernel.org/stable/c/d103fb6726904e353b4773188ee3d3acb4078363 - Patch
References () https://git.kernel.org/stable/c/ddf4e04e946aaa6c458b8b6829617cc44af2bffd - () https://git.kernel.org/stable/c/ddf4e04e946aaa6c458b8b6829617cc44af2bffd - Patch
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CWE CWE-416
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

21 Nov 2024, 08:40

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/1787b9f0729d318d67cf7c5a95f0c3dba9a7cc18 - () https://git.kernel.org/stable/c/1787b9f0729d318d67cf7c5a95f0c3dba9a7cc18 -
References () https://git.kernel.org/stable/c/6086258bd5ea7b5c706ff62da42b8e271b2401db - () https://git.kernel.org/stable/c/6086258bd5ea7b5c706ff62da42b8e271b2401db -
References () https://git.kernel.org/stable/c/876f8ab52363f649bcc74072157dfd7adfbabc0d - () https://git.kernel.org/stable/c/876f8ab52363f649bcc74072157dfd7adfbabc0d -
References () https://git.kernel.org/stable/c/a1a485e45d24b1cd8fe834fd6f1b06e2903827da - () https://git.kernel.org/stable/c/a1a485e45d24b1cd8fe834fd6f1b06e2903827da -
References () https://git.kernel.org/stable/c/d103fb6726904e353b4773188ee3d3acb4078363 - () https://git.kernel.org/stable/c/d103fb6726904e353b4773188ee3d3acb4078363 -
References () https://git.kernel.org/stable/c/ddf4e04e946aaa6c458b8b6829617cc44af2bffd - () https://git.kernel.org/stable/c/ddf4e04e946aaa6c458b8b6829617cc44af2bffd -
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: hsr: impedir el uso después de liberar en prp_create_tagged_frame(). La función prp_fill_rct() puede fallar. En esa situación, libera el skb y devuelve NULL. Mientras tanto, en el camino hacia el éxito, devuelve el skb original. Por lo tanto, es sencillo corregir el error utilizando el valor devuelto.

21 May 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-21 16:15

Updated : 2024-12-31 20:00


NVD link : CVE-2023-52846

Mitre link : CVE-2023-52846

CVE.ORG link : CVE-2023-52846


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free