Bug 1214772 (CVE-2023-4611)

Summary: VUL-0: CVE-2023-4611: kernel: use after free race between mbind() and VMA-locked page fault
Product: [Novell Products] SUSE Security Incidents Reporter: Alexander Bergmann <abergmann>
Component: IncidentsAssignee: Security Team bot <security-team>
Status: RESOLVED FIXED QA Contact: Security Team bot <security-team>
Severity: Normal    
Priority: P3 - Medium CC: meissner, mhocko, security-team
Version: unspecified   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/376626/
Whiteboard: CVSSv3.1:SUSE:CVE-2023-4611:7.0:(AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description Alexander Bergmann 2023-08-30 07:03:28 UTC
CVE-2023-4611

A use-after-free flaw was found in mm/mempolicy.c in the memory management
subsystem in the Linux Kernel. This issue is caused by a race between mbind()
and VMA-locked page fault, and may allow a local attacker to crash the system or
lead to a kernel information leak.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4611
https://bugzilla.redhat.com/show_bug.cgi?id=2227244
https://www.cve.org/CVERecord?id=CVE-2023-4611
https://access.redhat.com/security/cve/CVE-2023-4611
https://www.spinics.net/lists/stable-commits/msg310136.html
Comment 1 Michal Hocko 2023-08-30 07:59:45 UTC
This is 6.4+ issue. For us that means 15-sp6, ALP and stable branches. SP6 and ALP already have the fix via stable backport so I've just updated references. stable branch will get it eventually.
Comment 9 Gabriele Sonnu 2024-06-10 12:57:51 UTC
All done, closing.