CVE-2023-52600

In the Linux kernel, the following vulnerability has been resolved: jfs: fix uaf in jfs_evict_inode When the execution of diMount(ipimap) fails, the object ipimap that has been released may be accessed in diFreeSpecial(). Asynchronous ipimap release occurs when rcu_core() calls jfs_free_node(). Therefore, when diMount(ipimap) fails, sbi->ipimap should not be initialized as ipimap.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

12 Dec 2024, 17:36

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
First Time Linux linux Kernel
Linux
CWE CWE-416
References () https://git.kernel.org/stable/c/1696d6d7d4a1b373e96428d0fe1166bd7c3c795e - () https://git.kernel.org/stable/c/1696d6d7d4a1b373e96428d0fe1166bd7c3c795e - Patch
References () https://git.kernel.org/stable/c/32e8f2d95528d45828c613417cb2827d866cbdce - () https://git.kernel.org/stable/c/32e8f2d95528d45828c613417cb2827d866cbdce - Patch
References () https://git.kernel.org/stable/c/81b4249ef37297fb17ba102a524039a05c6c5d35 - () https://git.kernel.org/stable/c/81b4249ef37297fb17ba102a524039a05c6c5d35 - Patch
References () https://git.kernel.org/stable/c/8e44dc3f96e903815dab1d74fff8faafdc6feb61 - () https://git.kernel.org/stable/c/8e44dc3f96e903815dab1d74fff8faafdc6feb61 - Patch
References () https://git.kernel.org/stable/c/93df0a2a0b3cde2d7ab3a52ed46ea1d6d4aaba5f - () https://git.kernel.org/stable/c/93df0a2a0b3cde2d7ab3a52ed46ea1d6d4aaba5f - Patch
References () https://git.kernel.org/stable/c/bacdaa04251382d7efd4f09f9a0686bfcc297e2e - () https://git.kernel.org/stable/c/bacdaa04251382d7efd4f09f9a0686bfcc297e2e - Patch
References () https://git.kernel.org/stable/c/bc6ef64dbe71136f327d63b2b9071b828af2c2a8 - () https://git.kernel.org/stable/c/bc6ef64dbe71136f327d63b2b9071b828af2c2a8 - Patch
References () https://git.kernel.org/stable/c/e0e1958f4c365e380b17ccb35617345b31ef7bf3 - () https://git.kernel.org/stable/c/e0e1958f4c365e380b17ccb35617345b31ef7bf3 - Patch
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Patch
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - Patch

Information

Published : 2024-03-06 07:15

Updated : 2024-12-12 17:36


NVD link : CVE-2023-52600

Mitre link : CVE-2023-52600

CVE.ORG link : CVE-2023-52600


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free