CVE-2023-54019
Use-After-Free Vulnerability in Linux Kernel PSI Trigger Polling
Publication date: 2025-12-24
Last updated on: 2025-12-24
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
| linux | kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?
Apply the patch that fixes the use-after-free issue by using the kernfs_generic_poll function for polling on cgroup-specific psi triggers. This patch corrects the lifecycle management of the psi trigger's waitqueue and the associated file, preventing the use-after-free condition. Reverting the previous fix that addressed only the epoll() case is also part of the resolution.
Can you explain this vulnerability to me?
This vulnerability is a use-after-free (UAF) issue in the Linux kernel related to pressure stall information (PSI) triggers in cgroups. When a cgroup is removed while a polling process is still accessing a file associated with a PSI trigger, the trigger is destroyed prematurely, freeing memory that is still in use. This leads to the polling process accessing freed memory, causing undefined behavior or potential crashes. The root cause is the mismatch in lifecycle management between the PSI trigger's waitqueue and the file associated with it. The fix involves using kernfs_generic_poll to tie the waitqueue's lifecycle to the file's lifecycle, preventing premature destruction.
How can this vulnerability impact me? :
This vulnerability can lead to use-after-free memory access in the Linux kernel, which may cause system instability, crashes, or potential exploitation by attackers to execute arbitrary code or escalate privileges. Systems using cgroups with PSI triggers and polling processes are at risk if the vulnerability is not patched.