CVE-2023-1252
CVSS V2 None
CVSS V3 None
Description
A use-after-free flaw was found in the Linux kernel’s Ext4 File System in how a user triggers several file operations simultaneously with the overlay FS usage. This flaw allows a local user to crash or potentially escalate their privileges on the system. Only if patch 9a2544037600 ("ovl: fix use after free in struct ovl_aio_req") not applied yet, the kernel could be affected.
Overview
- CVE ID
- CVE-2023-1252
- Assigner
- secalert@redhat.com
- Vulnerability Status
- Modified
- Published Version
- 2023-03-23T21:15:19
- Last Modified Date
- 2023-05-05T20:15:09
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 1 | OR | 5.16 |
References
Reference URL | Reference Tags |
---|---|
https://lore.kernel.org/lkml/20211115165433.449951285@linuxfoundation.org/ | Mailing List Patch |
https://security.netapp.com/advisory/ntap-20230505-0005/ |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2023-1252 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1252 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2023-04-17 03:17:46 | Added to TrackCVE | |||
2023-04-17 03:17:49 | Weakness Enumeration | new | ||
2023-05-05 21:01:48 | 2023-05-05T20:15:09 | CVE Modified Date | updated | |
2023-05-05 21:01:48 | Analyzed | Modified | Vulnerability Status | updated |
2023-05-05 21:01:54 | References | updated |