CVE-2023-54107Use After Free in Linux

CWE-416Use After Free6 documents6 sources
Severity
5.8MEDIUM
No vector
EPSS
0.0%
top 92.35%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 24

Description

In the Linux kernel, the following vulnerability has been resolved: blk-cgroup: dropping parent refcount after pd_free_fn() is done Some cgroup policies will access parent pd through child pd even after pd_offline_fn() is done. If pd_free_fn() for parent is called before child, then UAF can be triggered. Hence it's better to guarantee the order of pd_free_fn(). Currently refcount of parent blkg is dropped in __blkg_release(), which is before pd_free_fn() is called in blkg_free_work_fn() while

Affected Packages3 packages

Debianlinux/linux_kernel< 6.3.7-1+1
CVEListV5linux/linuxd578c770c85233af592e54537f93f3831bde7e9ac7241babf0855d8a6180cd1743ff0ec34de40b4e+1
debiandebian/linux< linux 6.3.7-1 (forky)

🔴Vulnerability Details

2
OSV
CVE-2023-54107: In the Linux kernel, the following vulnerability has been resolved: blk-cgroup: dropping parent refcount after pd_free_fn() is done Some cgroup polici2025-12-24
GHSA
GHSA-4mrm-9mrj-crwx: In the Linux kernel, the following vulnerability has been resolved: blk-cgroup: dropping parent refcount after pd_free_fn() is done Some cgroup poli2025-12-24

📋Vendor Advisories

2
Red Hat
kernel: Linux kernel blk-cgroup: Use-after-free vulnerability leading to denial of service2025-12-24
Debian
CVE-2023-54107: linux - In the Linux kernel, the following vulnerability has been resolved: blk-cgroup:...2023

🕵️Threat Intelligence

1
Wiz
CVE-2023-54107 Impact, Exploitability, and Mitigation Steps | Wiz