CVE-2023-52975

Source
https://cve.org/CVERecord?id=CVE-2023-52975
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52975.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-52975
Downstream
Related
Published
2025-03-27T16:43:15.322Z
Modified
2026-03-12T03:27:50.895953Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
scsi: iscsi_tcp: Fix UAF during logout when accessing the shost ipaddress
Details

In the Linux kernel, the following vulnerability has been resolved:

scsi: iscsi_tcp: Fix UAF during logout when accessing the shost ipaddress

Bug report and analysis from Ding Hui.

During iSCSI session logout, if another task accesses the shost ipaddress attr, we can get a KASAN UAF report like this:

[ 276.942144] BUG: KASAN: use-after-free in rawspinlockbh+0x78/0xe0 [ 276.942535] Write of size 4 at addr ffff8881053b45b8 by task cat/4088 [ 276.943511] CPU: 2 PID: 4088 Comm: cat Tainted: G E 6.1.0-rc8+ #3 [ 276.943997] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020 [ 276.944470] Call Trace: [ 276.944943] <TASK> [ 276.945397] dumpstacklvl+0x34/0x48 [ 276.945887] printaddressdescription.constprop.0+0x86/0x1e7 [ 276.946421] printreport+0x36/0x4f [ 276.947358] kasanreport+0xad/0x130 [ 276.948234] kasancheckrange+0x35/0x1c0 [ 276.948674] rawspinlockbh+0x78/0xe0 [ 276.949989] iscsiswtcphostgetparam+0xad/0x2e0 [iscsitcp] [ 276.951765] showhostparamISCSIHOSTPARAMIPADDRESS+0xe9/0x130 [scsitransportiscsi] [ 276.952185] devattrshow+0x3f/0x80 [ 276.953005] sysfskfseqshow+0x1fb/0x3e0 [ 276.953401] seqreaditer+0x402/0x1020 [ 276.954260] vfsread+0x532/0x7b0 [ 276.955113] ksysread+0xed/0x1c0 [ 276.955952] dosyscall64+0x38/0x90 [ 276.956347] entrySYSCALL64afterhwframe+0x63/0xcd [ 276.956769] RIP: 0033:0x7f5d3a679222 [ 276.957161] Code: c0 e9 b2 fe ff ff 50 48 8d 3d 32 c0 0b 00 e8 a5 fe 01 00 0f 1f 44 00 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 0f 05 <48> 3d 00 f0 ff ff 77 56 c3 0f 1f 44 00 00 48 83 ec 28 48 89 54 24 [ 276.958009] RSP: 002b:00007ffc864d16a8 EFLAGS: 00000246 ORIGRAX: 0000000000000000 [ 276.958431] RAX: ffffffffffffffda RBX: 0000000000020000 RCX: 00007f5d3a679222 [ 276.958857] RDX: 0000000000020000 RSI: 00007f5d3a4fe000 RDI: 0000000000000003 [ 276.959281] RBP: 00007f5d3a4fe000 R08: 00000000ffffffff R09: 0000000000000000 [ 276.959682] R10: 0000000000000022 R11: 0000000000000246 R12: 0000000000020000 [ 276.960126] R13: 0000000000000003 R14: 0000000000000000 R15: 0000557a26dada58 [ 276.960536] </TASK> [ 276.961357] Allocated by task 2209: [ 276.961756] kasansavestack+0x1e/0x40 [ 276.962170] kasansettrack+0x21/0x30 [ 276.962557] __kasan_kmalloc+0x7e/0x90 [ 276.962923] __kmalloc+0x5b/0x140 [ 276.963308] iscsiallocsession+0x28/0x840 [scsitransportiscsi] [ 276.963712] iscsisessionsetup+0xda/0xba0 [libiscsi] [ 276.964078] iscsiswtcpsessioncreate+0x1fd/0x330 [iscsitcp] [ 276.964431] iscsiifcreatesession.isra.0+0x50/0x260 [scsitransportiscsi] [ 276.964793] iscsiifrecvmsg+0xc5a/0x2660 [scsitransportiscsi] [ 276.965153] iscsiifrx+0x198/0x4b0 [scsitransportiscsi] [ 276.965546] netlinkunicast+0x4d5/0x7b0 [ 276.965905] netlinksendmsg+0x78d/0xc30 [ 276.966236] socksendmsg+0xe5/0x120 [ 276.966576] ____sys_sendmsg+0x5fe/0x860 [ 276.966923] ___sys_sendmsg+0xe0/0x170 [ 276.967300] __syssendmsg+0xc8/0x170 [ 276.967666] dosyscall64+0x38/0x90 [ 276.968028] entrySYSCALL64afterhwframe+0x63/0xcd [ 276.968773] Freed by task 2209: [ 276.969111] kasansavestack+0x1e/0x40 [ 276.969449] kasansettrack+0x21/0x30 [ 276.969789] kasansavefreeinfo+0x2a/0x50 [ 276.970146] __kasanslabfree+0x106/0x190 [ 276.970470] __kmemcachefree+0x133/0x270 [ 276.970816] devicerelease+0x98/0x210 [ 276.971145] kobjectcleanup+0x101/0x360 [ 276.971462] iscsisessionteardown+0x3fb/0x530 [libiscsi] [ 276.971775] iscsiswtcpsessiondestroy+0xd8/0x130 [iscsitcp] [ 276.972143] iscsiifrecvmsg+0x1bf1/0x2660 [scsitransportiscsi] [ 276.972485] iscsiifrx+0x198/0x4b0 [scsitransportiscsi] [ 276.972808] netlinkunicast+0x4d5/0x7b0 [ 276.973201] netlinksendmsg+0x78d/0xc30 [ 276.973544] sock_sendmsg+0xe5/0x120 [ 276.973864] ____sys_sendmsg+0x5fe/0x860 [ 276.974248] __sys ---truncated---

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52975.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
a79af8a64d395bd89de8695a5ea5e1a7f01f02a8
Fixed
0af745fddefbd56198f4f35eb309215ee5f9e21e
Fixed
17b738590b97fb3fc287289971d1519ff9b875a1
Fixed
8859687f5b242c0b057461df0a9ff51d5500783b
Fixed
6f1d64b13097e85abda0f91b5638000afc5f9a06

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52975.json"