CVE-2023-52983

high

Description

In the Linux kernel, the following vulnerability has been resolved: block, bfq: fix uaf for bfqq in bic_set_bfqq() After commit 64dc8c732f5c ("block, bfq: fix possible uaf for 'bfqq->bic'"), bic->bfqq will be accessed in bic_set_bfqq(), however, in some context bic->bfqq will be freed, and bic_set_bfqq() is called with the freed bic->bfqq. Fix the problem by always freeing bfqq after bic_set_bfqq().

References

https://git.kernel.org/stable/c/cb1876fc33af26d00efdd473311f1b664c77c44e

https://git.kernel.org/stable/c/b600de2d7d3a16f9007fad1bdae82a3951a26af2

https://git.kernel.org/stable/c/7f77f3dab5066a7c9da73d72d1eee895ff84a8d5

https://git.kernel.org/stable/c/511c922c5bf6c8a166bea826e702336bc2424140

Details

Source: Mitre, NVD

Published: 2025-03-27

Updated: 2025-04-01

Risk Information

CVSS v2

Base Score: 4.6

Vector: CVSS2#AV:L/AC:L/Au:S/C:N/I:N/A:C

Severity: Medium

CVSS v3

Base Score: 7.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Severity: High