CVE-2023-53608

In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix potential UAF of struct nilfs_sc_info in nilfs_segctor_thread() The finalization of nilfs_segctor_thread() can race with nilfs_segctor_kill_thread() which terminates that thread, potentially causing a use-after-free BUG as KASAN detected. At the end of nilfs_segctor_thread(), it assigns NULL to "sc_task" member of "struct nilfs_sc_info" to indicate the thread has finished, and then notifies nilfs_segctor_kill_thread() of this using waitqueue "sc_wait_task" on the struct nilfs_sc_info. However, here, immediately after the NULL assignment to "sc_task", it is possible that nilfs_segctor_kill_thread() will detect it and return to continue the deallocation, freeing the nilfs_sc_info structure before the thread does the notification. This fixes the issue by protecting the NULL assignment to "sc_task" and its notification, with spinlock "sc_state_lock" of the struct nilfs_sc_info. Since nilfs_segctor_kill_thread() does a final check to see if "sc_task" is NULL with "sc_state_lock" locked, this can eliminate the race.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.3:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.3:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.3:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.3:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.3:rc5:*:*:*:*:*:*

History

05 Feb 2026, 16:40

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CPE cpe:2.3:o:linux:linux_kernel:6.3:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.3:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.3:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.3:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.3:rc3:*:*:*:*:*:*
First Time Linux
Linux linux Kernel
CWE CWE-416
References () https://git.kernel.org/stable/c/034cce77d52ba013ce62b4f5258c29907eb1ada5 - () https://git.kernel.org/stable/c/034cce77d52ba013ce62b4f5258c29907eb1ada5 - Patch
References () https://git.kernel.org/stable/c/0dbf0e64b91ee8fcb278aea93eb06fc7d56ecbcc - () https://git.kernel.org/stable/c/0dbf0e64b91ee8fcb278aea93eb06fc7d56ecbcc - Patch
References () https://git.kernel.org/stable/c/613bf23c070d11c525268f2945aa594704a9b764 - () https://git.kernel.org/stable/c/613bf23c070d11c525268f2945aa594704a9b764 - Patch
References () https://git.kernel.org/stable/c/6be49d100c22ffea3287a4b19d7639d259888e33 - () https://git.kernel.org/stable/c/6be49d100c22ffea3287a4b19d7639d259888e33 - Patch
References () https://git.kernel.org/stable/c/92684e02654c91a61a0b0561433b710bcece19fe - () https://git.kernel.org/stable/c/92684e02654c91a61a0b0561433b710bcece19fe - Patch
References () https://git.kernel.org/stable/c/b4d80bd6370b81a1725b6b8f7894802c23a14e9f - () https://git.kernel.org/stable/c/b4d80bd6370b81a1725b6b8f7894802c23a14e9f - Patch
References () https://git.kernel.org/stable/c/bae009a2f1b7c2011d2e92d8c84868d315c0b97e - () https://git.kernel.org/stable/c/bae009a2f1b7c2011d2e92d8c84868d315c0b97e - Patch
References () https://git.kernel.org/stable/c/f32297dba338dc06d62286dedb3cdbd5175b1719 - () https://git.kernel.org/stable/c/f32297dba338dc06d62286dedb3cdbd5175b1719 - Patch

04 Oct 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-10-04 16:15

Updated : 2026-02-05 16:40


NVD link : CVE-2023-53608

Mitre link : CVE-2023-53608

CVE.ORG link : CVE-2023-53608


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free