CVE-2023-54062
Use-After-Free Vulnerability in Linux Kernel ext4 Extended Attributes
Publication date: 2025-12-24
Last updated on: 2025-12-24
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is in the Linux kernel's ext4 filesystem code, specifically in the ext4_xattr_move_to_block() function. The issue arises because the function tries to free memory using kvfree() on a pointer that may no longer be valid, as the pointer to the extended attribute entry is removed before the free operation. This can lead to either freeing memory incorrectly or leaking memory by not freeing it when needed. The fix involves storing whether the memory should be freed in a separate variable to avoid invalid frees or leaks.
How can this vulnerability impact me? :
This vulnerability can impact a system by causing memory corruption or memory leaks in the Linux kernel's ext4 filesystem handling. Memory corruption can lead to system instability, crashes, or potential escalation of privileges if exploited. Memory leaks can degrade system performance over time by consuming resources unnecessarily.