CVE-2023-53608
BaseFortify
Publication date: 2025-10-04
Last updated on: 2026-03-23
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.3 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-416 | The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a use-after-free (UAF) issue in the Linux kernel's nilfs2 filesystem code. Specifically, a race condition occurs between two functions, nilfs_segctor_thread() and nilfs_segctor_kill_thread(). The nilfs_segctor_thread() function sets a pointer (sc_task) to NULL to indicate it has finished, then notifies nilfs_segctor_kill_thread(). However, nilfs_segctor_kill_thread() may detect the NULL and proceed to free the associated structure (nilfs_sc_info) before nilfs_segctor_thread() completes its notification, leading to a use-after-free bug. The fix involves protecting the assignment and notification with a spinlock to prevent this race condition.
How can this vulnerability impact me? :
This vulnerability can cause a use-after-free bug in the Linux kernel, which may lead to system instability, crashes, or potentially allow an attacker to execute arbitrary code or escalate privileges if exploited. The exact impact depends on the environment and how the nilfs2 filesystem is used.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update your Linux kernel to a version that includes the fix for the nilfs2 use-after-free issue in nilfs_segctor_thread(). This fix involves protecting the NULL assignment and notification with a spinlock to prevent the race condition. Until the update is applied, avoid using the affected nilfs2 functionality if possible.