CVE-2023-53608
EUVD-2025-3227204.10.2025, 16:15
In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix potential UAF of struct nilfs_sc_info in nilfs_segctor_thread() The finalization of nilfs_segctor_thread() can race with nilfs_segctor_kill_thread() which terminates that thread, potentially causing a use-after-free BUG as KASAN detected. At the end of nilfs_segctor_thread(), it assigns NULL to "sc_task" member of "struct nilfs_sc_info" to indicate the thread has finished, and then notifies nilfs_segctor_kill_thread() of this using waitqueue "sc_wait_task" on the struct nilfs_sc_info. However, here, immediately after the NULL assignment to "sc_task", it is possible that nilfs_segctor_kill_thread() will detect it and return to continue the deallocation, freeing the nilfs_sc_info structure before the thread does the notification. This fixes the issue by protecting the NULL assignment to "sc_task" and its notification, with spinlock "sc_state_lock" of the struct nilfs_sc_info. Since nilfs_segctor_kill_thread() does a final check to see if "sc_task" is NULL with "sc_state_lock" locked, this can eliminate the race.Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| linux | linux_kernel | 2.6.30 ≤ 𝑥 < 4.14.313 |
| linux | linux_kernel | 4.15 ≤ 𝑥 < 4.19.281 |
| linux | linux_kernel | 4.20 ≤ 𝑥 < 5.4.241 |
| linux | linux_kernel | 5.5 ≤ 𝑥 < 5.10.178 |
| linux | linux_kernel | 5.11 ≤ 𝑥 < 5.15.107 |
| linux | linux_kernel | 5.16 ≤ 𝑥 < 6.1.24 |
| linux | linux_kernel | 6.2 ≤ 𝑥 < 6.2.11 |
| linux | linux_kernel | 6.3:rc1 |
| linux | linux_kernel | 6.3:rc2 |
| linux | linux_kernel | 6.3:rc3 |
| linux | linux_kernel | 6.3:rc4 |
| linux | linux_kernel | 6.3:rc5 |
𝑥
= Vulnerable software versions
Debian Releases
Common Weakness Enumeration
References