In the Linux kernel, the following vulnerability has been resolved:
jfs: fix uaf in jfs_evict_inode
When the execution of diMount(ipimap) fails, the object ipimap that has been
released may be accessed in diFreeSpecial(). Asynchronous ipimap release occurs
when rcu_core() calls jfs_free_node().
Therefore, when diMount(ipimap) fails, sbi->ipimap should not be initialized as
ipimap.
References
Configurations
Configuration 1 (hide)
|
History
12 Dec 2024, 17:36
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
First Time |
Linux linux Kernel
Linux |
|
CWE | CWE-416 | |
References | () https://git.kernel.org/stable/c/1696d6d7d4a1b373e96428d0fe1166bd7c3c795e - Patch | |
References | () https://git.kernel.org/stable/c/32e8f2d95528d45828c613417cb2827d866cbdce - Patch | |
References | () https://git.kernel.org/stable/c/81b4249ef37297fb17ba102a524039a05c6c5d35 - Patch | |
References | () https://git.kernel.org/stable/c/8e44dc3f96e903815dab1d74fff8faafdc6feb61 - Patch | |
References | () https://git.kernel.org/stable/c/93df0a2a0b3cde2d7ab3a52ed46ea1d6d4aaba5f - Patch | |
References | () https://git.kernel.org/stable/c/bacdaa04251382d7efd4f09f9a0686bfcc297e2e - Patch | |
References | () https://git.kernel.org/stable/c/bc6ef64dbe71136f327d63b2b9071b828af2c2a8 - Patch | |
References | () https://git.kernel.org/stable/c/e0e1958f4c365e380b17ccb35617345b31ef7bf3 - Patch | |
References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Patch | |
References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - Patch |
Information
Published : 2024-03-06 07:15
Updated : 2024-12-12 17:36
NVD link : CVE-2023-52600
Mitre link : CVE-2023-52600
CVE.ORG link : CVE-2023-52600
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free