cve-2023-52731
Vulnerability from cvelistv5
Published
2024-05-21 15:22
Modified
2024-11-04 14:51
Severity ?
Summary
fbdev: Fix invalid page access after closing deferred I/O devices
Impacted products
LinuxLinux
LinuxLinux
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T23:11:35.499Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/87b9802ca824fcee7915e717e9a60471af62e8e9"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/f1d91f0e9d5a240a809698d7d9c5a538e7dcc149"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/3efc61d95259956db25347e2a9562c3e54546e20"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-52731",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-10T15:37:38.155499Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-11T17:33:36.311Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/video/fbdev/core/fb_defio.c",
            "drivers/video/fbdev/core/fbmem.c",
            "include/linux/fb.h"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "87b9802ca824",
              "status": "affected",
              "version": "186b89659c4c",
              "versionType": "git"
            },
            {
              "lessThan": "f1d91f0e9d5a",
              "status": "affected",
              "version": "56c134f7f1b5",
              "versionType": "git"
            },
            {
              "lessThan": "3efc61d95259",
              "status": "affected",
              "version": "56c134f7f1b5",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/video/fbdev/core/fb_defio.c",
            "drivers/video/fbdev/core/fbmem.c",
            "include/linux/fb.h"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "5.19"
            },
            {
              "lessThan": "5.19",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.13",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.2",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbdev: Fix invalid page access after closing deferred I/O devices\n\nWhen a fbdev with deferred I/O is once opened and closed, the dirty\npages still remain queued in the pageref list, and eventually later\nthose may be processed in the delayed work.  This may lead to a\ncorruption of pages, hitting an Oops.\n\nThis patch makes sure to cancel the delayed work and clean up the\npageref list at closing the device for addressing the bug.  A part of\nthe cleanup code is factored out as a new helper function that is\ncalled from the common fb_release()."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-04T14:51:37.911Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/87b9802ca824fcee7915e717e9a60471af62e8e9"
        },
        {
          "url": "https://git.kernel.org/stable/c/f1d91f0e9d5a240a809698d7d9c5a538e7dcc149"
        },
        {
          "url": "https://git.kernel.org/stable/c/3efc61d95259956db25347e2a9562c3e54546e20"
        }
      ],
      "title": "fbdev: Fix invalid page access after closing deferred I/O devices",
      "x_generator": {
        "engine": "bippy-9e1c9544281a"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2023-52731",
    "datePublished": "2024-05-21T15:22:57.282Z",
    "dateReserved": "2024-05-21T15:19:24.232Z",
    "dateUpdated": "2024-11-04T14:51:37.911Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2023-52731\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-05-21T16:15:13.237\",\"lastModified\":\"2024-05-21T16:53:56.550\",\"vulnStatus\":\"Awaiting Analysis\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nfbdev: Fix invalid page access after closing deferred I/O devices\\n\\nWhen a fbdev with deferred I/O is once opened and closed, the dirty\\npages still remain queued in the pageref list, and eventually later\\nthose may be processed in the delayed work.  This may lead to a\\ncorruption of pages, hitting an Oops.\\n\\nThis patch makes sure to cancel the delayed work and clean up the\\npageref list at closing the device for addressing the bug.  A part of\\nthe cleanup code is factored out as a new helper function that is\\ncalled from the common fb_release().\"},{\"lang\":\"es\",\"value\":\" En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: fbdev: corrige el acceso a p\u00e1ginas no v\u00e1lidas despu\u00e9s de cerrar dispositivos de E/S diferidas. Cuando un fbdev con E/S diferidas se abre y cierra una vez, las p\u00e1ginas sucias a\u00fan permanecen en cola en la lista pageref. y, eventualmente, m\u00e1s adelante, podr\u00e1n procesarse en el trabajo retrasado. Esto puede provocar la corrupci\u00f3n de las p\u00e1ginas y provocar un error. Este parche garantiza cancelar el trabajo retrasado y limpiar la lista de referencias de p\u00e1gina al cerrar el dispositivo para solucionar el error. Una parte del c\u00f3digo de limpieza se factoriza como una nueva funci\u00f3n auxiliar que se llama desde el fb_release() com\u00fan.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/3efc61d95259956db25347e2a9562c3e54546e20\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/87b9802ca824fcee7915e717e9a60471af62e8e9\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/f1d91f0e9d5a240a809698d7d9c5a538e7dcc149\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...
  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.