CVE-2023-53608
Severity CVSS v4.0:
Pending analysis
Type:
CWE-416
Use After Free
Publication date:
04/10/2025
Last modified:
05/02/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
nilfs2: fix potential UAF of struct nilfs_sc_info in nilfs_segctor_thread()<br />
<br />
The finalization of nilfs_segctor_thread() can race with<br />
nilfs_segctor_kill_thread() which terminates that thread, potentially<br />
causing a use-after-free BUG as KASAN detected.<br />
<br />
At the end of nilfs_segctor_thread(), it assigns NULL to "sc_task" member<br />
of "struct nilfs_sc_info" to indicate the thread has finished, and then<br />
notifies nilfs_segctor_kill_thread() of this using waitqueue<br />
"sc_wait_task" on the struct nilfs_sc_info.<br />
<br />
However, here, immediately after the NULL assignment to "sc_task", it is<br />
possible that nilfs_segctor_kill_thread() will detect it and return to<br />
continue the deallocation, freeing the nilfs_sc_info structure before the<br />
thread does the notification.<br />
<br />
This fixes the issue by protecting the NULL assignment to "sc_task" and<br />
its notification, with spinlock "sc_state_lock" of the struct<br />
nilfs_sc_info. Since nilfs_segctor_kill_thread() does a final check to<br />
see if "sc_task" is NULL with "sc_state_lock" locked, this can eliminate<br />
the race.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.30 (including) | 4.14.313 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.15 (including) | 4.19.281 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.20 (including) | 5.4.241 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.178 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.107 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.24 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.2.11 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.3:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.3:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.3:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.3:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.3:rc5:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/034cce77d52ba013ce62b4f5258c29907eb1ada5
- https://git.kernel.org/stable/c/0dbf0e64b91ee8fcb278aea93eb06fc7d56ecbcc
- https://git.kernel.org/stable/c/613bf23c070d11c525268f2945aa594704a9b764
- https://git.kernel.org/stable/c/6be49d100c22ffea3287a4b19d7639d259888e33
- https://git.kernel.org/stable/c/92684e02654c91a61a0b0561433b710bcece19fe
- https://git.kernel.org/stable/c/b4d80bd6370b81a1725b6b8f7894802c23a14e9f
- https://git.kernel.org/stable/c/bae009a2f1b7c2011d2e92d8c84868d315c0b97e
- https://git.kernel.org/stable/c/f32297dba338dc06d62286dedb3cdbd5175b1719



