CVE-2023-52983

In the Linux kernel, the following vulnerability has been resolved: block, bfq: fix uaf for bfqq in bic_set_bfqq() After commit 64dc8c732f5c ("block, bfq: fix possible uaf for 'bfqq->bic'"), bic->bfqq will be accessed in bic_set_bfqq(), however, in some context bic->bfqq will be freed, and bic_set_bfqq() is called with the freed bic->bfqq. Fix the problem by always freeing bfqq after bic_set_bfqq().
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.0.16:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-03-27 17:15

Updated : 2025-04-01 15:39


NVD link : CVE-2023-52983

Mitre link : CVE-2023-52983

CVE.ORG link : CVE-2023-52983


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free