CVE-2023-52566

Severity CVSS v4.0:
Pending analysis
Type:
CWE-416 Use After Free
Publication date:
02/03/2024
Last modified:
08/04/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> nilfs2: fix potential use after free in nilfs_gccache_submit_read_data()<br /> <br /> In nilfs_gccache_submit_read_data(), brelse(bh) is called to drop the<br /> reference count of bh when the call to nilfs_dat_translate() fails. If<br /> the reference count hits 0 and its owner page gets unlocked, bh may be<br /> freed. However, bh-&gt;b_page is dereferenced to put the page after that,<br /> which may result in a use-after-free bug. This patch moves the release<br /> operation after unlocking and putting the page.<br /> <br /> NOTE: The function in question is only called in GC, and in combination<br /> with current userland tools, address translation using DAT does not occur<br /> in that function, so the code path that causes this issue will not be<br /> executed. However, it is possible to run that code path by intentionally<br /> modifying the userland GC library or by calling the GC ioctl directly.<br /> <br /> [konishi.ryusuke@gmail.com: NOTE added to the commit log]

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 2.6.30 (including) 4.14.327 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.15 (including) 4.19.296 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.20 (including) 5.4.258 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.198 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.134 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.56 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.5.6 (excluding)
cpe:2.3:o:linux:linux_kernel:6.6:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc3:*:*:*:*:*:*