Release Date: | 2024-05-21 |
In the Linux kernel, the following vulnerability has been resolved:\nsmb: client: fix potential deadlock when releasing mids\nAll release_mid() callers seem to hold a reference of @mid so there is\nno need to call kref_put(&mid->refcount, __release_mid) under\n@server->mid_lock spinlock. If they don't, then an use-after-free bug\nwould have occurred anyways.\nBy getting rid of such spinlock also fixes a potential deadlock as\nshown below\nCPU 0 CPU 1\n------------------------------------------------------------------\ncifs_demultiplex_thread() cifs_debug_data_proc_show()\nrelease_mid()\nspin_lock(&server->mid_lock);\nspin_lock(&cifs_tcp_ses_lock)\nspin_lock(&server->mid_lock)\n__release_mid()\nsmb2_find_smb_tcon()\nspin_lock(&cifs_tcp_ses_lock) *deadlock*
See more information about CVE-2023-52757 from MITRE CVE dictionary and NIST NVD
NOTE: The following CVSS v3.1 metrics and score provided are preliminary and subject to review.
Base Score: | 5.5 | CVSS Vector: | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
Attack Vector: | Local network | Attack Complexity: | Low |
Privileges Required: | Low | User Interaction: | None |
Scope: | Unchanged | Confidentiality Impact: | None |
Integrity Impact: | None | Availability Impact: | High |
Platform | Errata | Release Date |
Oracle Linux version 9 (kernel) | ELSA-2024-9315 | 2024-11-14 |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections: