CVE-2023-54107
Use-After-Free Vulnerability in Linux Kernel blk-cgroup Component
Publication date: 2025-12-24
Last updated on: 2025-12-24
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel involves a use-after-free (UAF) issue related to the blk-cgroup subsystem. Specifically, some cgroup policies access the parent's page directory (pd) through the child's pd even after the child's pd_offline_fn() has completed. If the parent's pd_free_fn() is called before the child's, it can trigger a UAF condition. The problem arises because the reference count of the parent block group (blkg) is dropped asynchronously before pd_free_fn() is called, leading to potential premature freeing. The fix ensures the correct order by delaying dropping the parent's refcount until after pd_free_fn() is called for the child, preventing the UAF.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update your Linux kernel to a version that includes the patch fixing the blk-cgroup parent refcount issue. This patch ensures the correct order of pd_free_fn() calls to prevent use-after-free conditions. Applying the latest kernel updates from your distribution or vendor is recommended.
How can this vulnerability impact me? :
This vulnerability can lead to a use-after-free condition in the Linux kernel's blk-cgroup subsystem, which may cause system instability, crashes, or potentially allow an attacker to execute arbitrary code or escalate privileges if exploited. Such kernel-level vulnerabilities can compromise system security and reliability.