CVE-2023-4389
Summary
| CVE | CVE-2023-4389 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-08-16 19:15:00 UTC |
| Updated | 2023-11-07 04:22:00 UTC |
| Description | A flaw was found in btrfs_get_root_ref in fs/btrfs/disk-io.c in the btrfs filesystem in the Linux Kernel due to a double decrement of the reference count. This issue may allow a local attacker with user privilege to crash the system or may lead to leaked internal kernel information. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| cve-details |
MISC |
access.redhat.com |
|
| 2219271 – (CVE-2023-4389) CVE-2023-4389 kernel: btrfs: double free in btrfs_get_root_ref() |
MISC |
bugzilla.redhat.com |
|
| fs: btrfs: fix possible use-after-free bug in error handling code of btrfs_get_root_ref() - Patchwork |
MISC |
patchwork.kernel.org |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 755059 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:4035-1)
- 755061 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:4030-1)
- 755082 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:4058-1)
- 755083 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:4057-1)
- 755085 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:4072-1)
- 755086 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:4071-1)
- 755096 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:4093-1)
- 755107 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:4095-1)
- 755229 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:4072-2)