
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2023-52438 is a use-after-free vulnerability discovered in the Linux kernel's binder subsystem, specifically in the shrinker's callback functionality. The vulnerability was disclosed in February 2024 and affects Linux kernel versions from 4.20.0 through 6.7.0. The issue occurs because the mmap read lock is used during the shrinker's callback, which can lead to unsafe usage of the alloc->vma pointer as it can race with munmap() operations (NVD).
The vulnerability stems from a race condition where the mmap lock is downgraded after the vma has been isolated, as introduced by commit dd2283f2605e. The issue was confirmed through KASAN reports showing a slab-use-after-free in zap_page_range_single function. The vulnerability has been assigned a CVSS v3.1 base score of 7.8 (HIGH) with vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (NVD).
The vulnerability could allow a local attacker to potentially cause a denial of service condition, execute arbitrary code, or gain elevated privileges on the system. The high CVSS score indicates serious potential consequences if exploited, with possible impacts on system confidentiality, integrity, and availability (NVD).
The issue has been fixed by implementing a vma_lookup() check which will fail to find the vma that was isolated before the mmap lock downgrade. This solution provides better performance than upgrading to a mmap write lock. The fix has been incorporated into various Linux kernel versions through security updates (Kernel Patch, Ubuntu Notice).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."