CVE-2023-52600

Source
https://cve.org/CVERecord?id=CVE-2023-52600
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-52600.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-52600
Downstream
Related
Published
2024-03-06T06:45:28.198Z
Modified
2026-03-14T12:16:49.817839Z
Summary
jfs: fix uaf in jfs_evict_inode
Details

In the Linux kernel, the following vulnerability has been resolved:

jfs: fix uaf in jfsevictinode

When the execution of diMount(ipimap) fails, the object ipimap that has been released may be accessed in diFreeSpecial(). Asynchronous ipimap release occurs when rcucore() calls jfsfree_node().

Therefore, when diMount(ipimap) fails, sbi->ipimap should not be initialized as ipimap.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52600.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Fixed
81b4249ef37297fb17ba102a524039a05c6c5d35
Fixed
93df0a2a0b3cde2d7ab3a52ed46ea1d6d4aaba5f
Fixed
bc6ef64dbe71136f327d63b2b9071b828af2c2a8
Fixed
8e44dc3f96e903815dab1d74fff8faafdc6feb61
Fixed
32e8f2d95528d45828c613417cb2827d866cbdce
Fixed
1696d6d7d4a1b373e96428d0fe1166bd7c3c795e
Fixed
bacdaa04251382d7efd4f09f9a0686bfcc297e2e
Fixed
e0e1958f4c365e380b17ccb35617345b31ef7bf3

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-52600.json"