Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1020 CNY

100%

CVE-2023-52922— can: bcm: Fix UAF in bcm_proc_show()

EPSS 0.01% · P3

Affected Version Matrix 18

VendorProductVersion RangeStatus
LinuxLinuxffd980f976e7fd666c2e61bf8ab35107efd11828< 11b8e27ed448baa385d90154a141466bd5e92f18affected
ffd980f976e7fd666c2e61bf8ab35107efd11828< 9b58d36d0c1ea29a9571e0222a9c29df0ccfb7ffaffected
ffd980f976e7fd666c2e61bf8ab35107efd11828< 9533dbfac0ff7edd77a5fa2c24974b1d66c8b0a6affected
ffd980f976e7fd666c2e61bf8ab35107efd11828< cf254b4f68e480e73dab055014e002b77aed30edaffected
ffd980f976e7fd666c2e61bf8ab35107efd11828< 3c3941bb1eb53abe7d640ffee5c4d6b559829ab3affected
ffd980f976e7fd666c2e61bf8ab35107efd11828< 995f47d76647708ec26c6e388663ad4f3f264787affected
ffd980f976e7fd666c2e61bf8ab35107efd11828< dfd0aa26e9a07f2ce546ccf8304ead6a2914e8a7affected
ffd980f976e7fd666c2e61bf8ab35107efd11828< 55c3b96074f3f9b0aee19bf93cd71af7516582bbaffected
… +10 more rows
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2023-52922

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
can: bcm: Fix UAF in bcm_proc_show()
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: can: bcm: Fix UAF in bcm_proc_show() BUG: KASAN: slab-use-after-free in bcm_proc_show+0x969/0xa80 Read of size 8 at addr ffff888155846230 by task cat/7862 CPU: 1 PID: 7862 Comm: cat Not tainted 6.5.0-rc1-00153-gc8746099c197 #230 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014 Call Trace: <TASK> dump_stack_lvl+0xd5/0x150 print_report+0xc1/0x5e0 kasan_report+0xba/0xf0 bcm_proc_show+0x969/0xa80 seq_read_iter+0x4f6/0x1260 seq_read+0x165/0x210 proc_reg_read+0x227/0x300 vfs_read+0x1d5/0x8d0 ksys_read+0x11e/0x240 do_syscall_64+0x35/0xb0 entry_SYSCALL_64_after_hwframe+0x63/0xcd Allocated by task 7846: kasan_save_stack+0x1e/0x40 kasan_set_track+0x21/0x30 __kasan_kmalloc+0x9e/0xa0 bcm_sendmsg+0x264b/0x44e0 sock_sendmsg+0xda/0x180 ____sys_sendmsg+0x735/0x920 ___sys_sendmsg+0x11d/0x1b0 __sys_sendmsg+0xfa/0x1d0 do_syscall_64+0x35/0xb0 entry_SYSCALL_64_after_hwframe+0x63/0xcd Freed by task 7846: kasan_save_stack+0x1e/0x40 kasan_set_track+0x21/0x30 kasan_save_free_info+0x27/0x40 ____kasan_slab_free+0x161/0x1c0 slab_free_freelist_hook+0x119/0x220 __kmem_cache_free+0xb4/0x2e0 rcu_core+0x809/0x1bd0 bcm_op is freed before procfs entry be removed in bcm_release(), this lead to bcm_proc_show() may read the freed bcm_op.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于会重新读取释放的内存。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux ffd980f976e7fd666c2e61bf8ab35107efd11828 ~ 11b8e27ed448baa385d90154a141466bd5e92f18 -
LinuxLinux 2.6.25 -

II. Public POCs for CVE-2023-52922

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2023-52922

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2023-52922

No comments yet


Leave a comment