CVE-2023-53111

Severity CVSS v4.0:
Pending analysis
Type:
CWE-416 Use After Free
Publication date:
02/05/2025
Last modified:
10/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> loop: Fix use-after-free issues<br /> <br /> do_req_filebacked() calls blk_mq_complete_request() synchronously or<br /> asynchronously when using asynchronous I/O unless memory allocation fails.<br /> Hence, modify loop_handle_cmd() such that it does not dereference &amp;#39;cmd&amp;#39; nor<br /> &amp;#39;rq&amp;#39; after do_req_filebacked() finished unless we are sure that the request<br /> has not yet been completed. This patch fixes the following kernel crash:<br /> <br /> Unable to handle kernel NULL pointer dereference at virtual address 0000000000000054<br /> Call trace:<br /> css_put.42938+0x1c/0x1ac<br /> loop_process_work+0xc8c/0xfd4<br /> loop_rootcg_workfn+0x24/0x34<br /> process_one_work+0x244/0x558<br /> worker_thread+0x400/0x8fc<br /> kthread+0x16c/0x1e0<br /> ret_from_fork+0x10/0x20

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.4 (including) 5.15.104 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.21 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.2.8 (excluding)
cpe:2.3:o:linux:linux_kernel:6.3:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.3:rc2:*:*:*:*:*:*