SB2024053110 - Use-after-free in Linux kernel block driver
Published: May 31, 2024 Updated: May 14, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Use-after-free (CVE-ID: CVE-2023-52837)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the nbd_dev_remove(), nbd_release() and IS_ENABLED() functions in drivers/block/nbd.c. A local user can escalate privileges on the system.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/4e9b3ec84dc97909876641dad14e0a2300d6c2a3
- https://git.kernel.org/stable/c/879947f4180bc6e83af64eb0515e0cf57fce15db
- https://git.kernel.org/stable/c/56bd7901b5e9dbc9112036ea615ebcba1565fafe
- https://git.kernel.org/stable/c/327462725b0f759f093788dfbcb2f1fd132f956b
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.63
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.12
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.2
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.7