We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2023-52989

firewire: fix memory leak for payload of request subaction to IEC 61883-1 FCP region



Description

In the Linux kernel, the following vulnerability has been resolved: firewire: fix memory leak for payload of request subaction to IEC 61883-1 FCP region This patch is fix for Linux kernel v2.6.33 or later. For request subaction to IEC 61883-1 FCP region, Linux FireWire subsystem have had an issue of use-after-free. The subsystem allows multiple user space listeners to the region, while data of the payload was likely released before the listeners execute read(2) to access to it for copying to user space. The issue was fixed by a commit 281e20323ab7 ("firewire: core: fix use-after-free regression in FCP handler"). The object of payload is duplicated in kernel space for each listener. When the listener executes ioctl(2) with FW_CDEV_IOC_SEND_RESPONSE request, the object is going to be released. However, it causes memory leak since the commit relies on call of release_request() in drivers/firewire/core-cdev.c. Against the expectation, the function is never called due to the design of release_client_resource(). The function delegates release task to caller when called with non-NULL fourth argument. The implementation of ioctl_send_response() is the case. It should release the object explicitly. This commit fixes the bug.

Reserved 2025-03-27 | Published 2025-03-27 | Updated 2025-05-04 | Assigner Linux

Product status

Default status
unaffected

281e20323ab72180137824a298ee9e21e6f9acf6 before b2cd3947d116bb9ba7ff097b5fc747a8956764db
affected

281e20323ab72180137824a298ee9e21e6f9acf6 before 356ff89acdbe6a66019154bc7eb2d300f5b15103
affected

281e20323ab72180137824a298ee9e21e6f9acf6 before 53785fd9b315583cf029e39f72b73d23704a2253
affected

281e20323ab72180137824a298ee9e21e6f9acf6 before d5a2dcee53fa6e6e2822f93cb3f1b0cd23163bee
affected

281e20323ab72180137824a298ee9e21e6f9acf6 before 5f4543c9382ae2d5062f6aa4fecae0c9258d0b0e
affected

281e20323ab72180137824a298ee9e21e6f9acf6 before c8bdc88216f09cb7387fedbdf613524367328616
affected

281e20323ab72180137824a298ee9e21e6f9acf6 before 531390a243ef47448f8bad01c186c2787666bf4d
affected

Default status
affected

2.6.33
affected

Any version before 2.6.33
unaffected

4.14.306
unaffected

4.19.273
unaffected

5.4.232
unaffected

5.10.168
unaffected

5.15.93
unaffected

6.1.11
unaffected

6.2
unaffected

References

git.kernel.org/...c/b2cd3947d116bb9ba7ff097b5fc747a8956764db

git.kernel.org/...c/356ff89acdbe6a66019154bc7eb2d300f5b15103

git.kernel.org/...c/53785fd9b315583cf029e39f72b73d23704a2253

git.kernel.org/...c/d5a2dcee53fa6e6e2822f93cb3f1b0cd23163bee

git.kernel.org/...c/5f4543c9382ae2d5062f6aa4fecae0c9258d0b0e

git.kernel.org/...c/c8bdc88216f09cb7387fedbdf613524367328616

git.kernel.org/...c/531390a243ef47448f8bad01c186c2787666bf4d

cve.org (CVE-2023-52989)

nvd.nist.gov (CVE-2023-52989)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2023-52989

Support options

Helpdesk Chat, Email, Knowledgebase