In the Linux kernel, the following vulnerability has been resolved:
nilfs2: fix potential UAF of struct nilfs_sc_info in nilfs_segctor_thread()
The finalization of nilfs_segctor_thread() can race with
nilfs_segctor_kill_thread() which terminates that thread, potentially
causing a use-after-free BUG as KASAN detected.
At the end of nilfs_segctor_thread(), it assigns NULL to "sc_task" member
of "struct nilfs_sc_info" to indicate the thread has finished, and then
notifies nilfs_segctor_kill_thread() of this using waitqueue
"sc_wait_task" on the struct nilfs_sc_info.
However, here, immediately after the NULL assignment to "sc_task", it is
possible that nilfs_segctor_kill_thread() will detect it and return to
continue the deallocation, freeing the nilfs_sc_info structure before the
thread does the notification.
This fixes the issue by protecting the NULL assignment to "sc_task" and
its notification, with spinlock "sc_state_lock" of the struct
nilfs_sc_info. Since nilfs_segctor_kill_thread() does a final check to
see if "sc_task" is NULL with "sc_state_lock" locked, this can eliminate
the race.
References
Configurations
Configuration 1 (hide)
|
History
05 Feb 2026, 16:40
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
| CPE | cpe:2.3:o:linux:linux_kernel:6.3:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.3:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.3:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.3:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.3:rc3:*:*:*:*:*:* |
|
| First Time |
Linux
Linux linux Kernel |
|
| CWE | CWE-416 | |
| References | () https://git.kernel.org/stable/c/034cce77d52ba013ce62b4f5258c29907eb1ada5 - Patch | |
| References | () https://git.kernel.org/stable/c/0dbf0e64b91ee8fcb278aea93eb06fc7d56ecbcc - Patch | |
| References | () https://git.kernel.org/stable/c/613bf23c070d11c525268f2945aa594704a9b764 - Patch | |
| References | () https://git.kernel.org/stable/c/6be49d100c22ffea3287a4b19d7639d259888e33 - Patch | |
| References | () https://git.kernel.org/stable/c/92684e02654c91a61a0b0561433b710bcece19fe - Patch | |
| References | () https://git.kernel.org/stable/c/b4d80bd6370b81a1725b6b8f7894802c23a14e9f - Patch | |
| References | () https://git.kernel.org/stable/c/bae009a2f1b7c2011d2e92d8c84868d315c0b97e - Patch | |
| References | () https://git.kernel.org/stable/c/f32297dba338dc06d62286dedb3cdbd5175b1719 - Patch |
04 Oct 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-10-04 16:15
Updated : 2026-02-05 16:40
NVD link : CVE-2023-53608
Mitre link : CVE-2023-53608
CVE.ORG link : CVE-2023-53608
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free
