In the Linux kernel, the following vulnerability has been resolved:
gfs2: Fix slab-use-after-free in gfs2_qd_dealloc
In gfs2_put_super(), whether withdrawn or not, the quota should
be cleaned up by gfs2_quota_cleanup().
Otherwise, struct gfs2_sbd will be freed before gfs2_qd_dealloc (rcu
callback) has run for all gfs2_quota_data objects, resulting in
use-after-free.
Also, gfs2_destroy_threads() and gfs2_quota_cleanup() is already called
by gfs2_make_fs_ro(), so in gfs2_put_super(), after calling
gfs2_make_fs_ro(), there is no need to call them again.
gfs2: Fix slab-use-after-free in gfs2_qd_dealloc
In gfs2_put_super(), whether withdrawn or not, the quota should
be cleaned up by gfs2_quota_cleanup().
Otherwise, struct gfs2_sbd will be freed before gfs2_qd_dealloc (rcu
callback) has run for all gfs2_quota_data objects, resulting in
use-after-free.
Also, gfs2_destroy_threads() and gfs2_quota_cleanup() is already called
by gfs2_make_fs_ro(), so in gfs2_put_super(), after calling
gfs2_make_fs_ro(), there is no need to call them again.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4008-1 | linux-6.1 security update |
Debian DSA |
DSA-5731-1 | linux security update |
Ubuntu USN |
USN-6972-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6972-2 | Linux kernel (AWS) vulnerabilities |
Ubuntu USN |
USN-6972-3 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-6972-4 | Linux kernel (Oracle) vulnerabilities |
Ubuntu USN |
USN-6973-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6973-2 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-6973-3 | Linux kernel (AWS) vulnerabilities |
Ubuntu USN |
USN-6973-4 | Linux kernel (Raspberry Pi) vulnerabilities |
Ubuntu USN |
USN-6974-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6974-2 | Linux kernel (Oracle) vulnerabilities |
Ubuntu USN |
USN-7006-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7019-1 | Linux kernel vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 03 Nov 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 04 Nov 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2025-11-03T21:50:24.860Z
Reserved: 2024-05-21T15:19:24.237Z
Link: CVE-2023-52760
Updated: 2024-08-02T23:11:36.034Z
Status : Modified
Published: 2024-05-21T16:15:15.410
Modified: 2025-11-03T22:16:31.657
Link: CVE-2023-52760
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
Ubuntu USN