CVE-2023-52760

high

Description

In the Linux kernel, the following vulnerability has been resolved: gfs2: Fix slab-use-after-free in gfs2_qd_dealloc In gfs2_put_super(), whether withdrawn or not, the quota should be cleaned up by gfs2_quota_cleanup(). Otherwise, struct gfs2_sbd will be freed before gfs2_qd_dealloc (rcu callback) has run for all gfs2_quota_data objects, resulting in use-after-free. Also, gfs2_destroy_threads() and gfs2_quota_cleanup() is already called by gfs2_make_fs_ro(), so in gfs2_put_super(), after calling gfs2_make_fs_ro(), there is no need to call them again.

References

https://thecyberexpress.com/linux-kernel-vulnerabilitie

https://git.kernel.org/stable/c/bdcb8aa434c6d36b5c215d02a9ef07551be25a37

https://git.kernel.org/stable/c/7ad4e0a4f61c57c3ca291ee010a9d677d0199fba

https://git.kernel.org/stable/c/08a28272faa750d4357ea2cb48d2baefd778ea81

Details

Source: Mitre, NVD

Published: 2024-05-21

Updated: 2024-07-05

Risk Information

CVSS v2

Base Score: 6.8

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

Severity: Medium

CVSS v3

Base Score: 7.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Severity: High