In the Linux kernel, the following vulnerability has been resolved:
block, bfq: fix uaf for bfqq in bic_set_bfqq()
After commit 64dc8c732f5c ("block, bfq: fix possible uaf for 'bfqq->bic'"),
bic->bfqq will be accessed in bic_set_bfqq(), however, in some context
bic->bfqq will be freed, and bic_set_bfqq() is called with the freed
bic->bfqq.
Fix the problem by always freeing bfqq after bic_set_bfqq().
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-03-27 17:15
Updated : 2025-04-01 15:39
NVD link : CVE-2023-52983
Mitre link : CVE-2023-52983
CVE.ORG link : CVE-2023-52983
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free
