CVE-2023-53025

In the Linux kernel, the following vulnerability has been resolved: NFSD: fix use-after-free in nfsd4_ssc_setup_dul() If signal_pending() returns true, schedule_timeout() will not be executed, causing the waiting task to remain in the wait queue. Fixed by adding a call to finish_wait(), which ensures that the waiting task will always be removed from the wait queue.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc4:*:*:*:*:*:*

History

01 Apr 2025, 15:38

Type Values Removed Values Added
First Time Linux
Linux linux Kernel
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: NFSD: se corrige el problema de use-after-free en nfsd4_ssc_setup_dul(). Si signal_pending() devuelve verdadero, schedule_timeout() no se ejecutará, lo que provocará que la tarea en espera permanezca en la cola de espera. Se solucionó añadiendo una llamada a finish_wait(), lo que garantiza que la tarea en espera siempre se elimine de la cola de espera.
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc4:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/0a27dcd5343026ac0cb168ee63304255372b7a36 - () https://git.kernel.org/stable/c/0a27dcd5343026ac0cb168ee63304255372b7a36 - Patch
References () https://git.kernel.org/stable/c/32d5eb95f8f0e362e37c393310b13b9e95404560 - () https://git.kernel.org/stable/c/32d5eb95f8f0e362e37c393310b13b9e95404560 - Patch
References () https://git.kernel.org/stable/c/6ac4c383c39f8f2f955f868d1ad9365c2363e80b - () https://git.kernel.org/stable/c/6ac4c383c39f8f2f955f868d1ad9365c2363e80b - Patch
References () https://git.kernel.org/stable/c/e6cf91b7b47ff82b624bdfe2fdcde32bb52e71dd - () https://git.kernel.org/stable/c/e6cf91b7b47ff82b624bdfe2fdcde32bb52e71dd - Patch

27 Mar 2025, 18:17

Type Values Removed Values Added
CWE CWE-416
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8

27 Mar 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-27 17:15

Updated : 2025-04-01 15:38


NVD link : CVE-2023-53025

Mitre link : CVE-2023-53025

CVE.ORG link : CVE-2023-53025


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free