2025-05-02 16:00:49 +00:00
{
2025-05-02 16:02:18 +00:00
"data_version" : "4.0" ,
2025-05-02 16:00:49 +00:00
"data_type" : "CVE" ,
"data_format" : "MITRE" ,
"CVE_data_meta" : {
"ID" : "CVE-2023-53111" ,
2025-05-02 16:02:18 +00:00
"ASSIGNER" : "cve@kernel.org" ,
"STATE" : "PUBLIC"
2025-05-02 16:00:49 +00:00
} ,
"description" : {
"description_data" : [
{
"lang" : "eng" ,
2025-05-02 16:02:18 +00:00
"value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nloop: Fix use-after-free issues\n\ndo_req_filebacked() calls blk_mq_complete_request() synchronously or\nasynchronously when using asynchronous I/O unless memory allocation fails.\nHence, modify loop_handle_cmd() such that it does not dereference 'cmd' nor\n'rq' after do_req_filebacked() finished unless we are sure that the request\nhas not yet been completed. This patch fixes the following kernel crash:\n\nUnable to handle kernel NULL pointer dereference at virtual address 0000000000000054\nCall trace:\n css_put.42938+0x1c/0x1ac\n loop_process_work+0xc8c/0xfd4\n loop_rootcg_workfn+0x24/0x34\n process_one_work+0x244/0x558\n worker_thread+0x400/0x8fc\n kthread+0x16c/0x1e0\n ret_from_fork+0x10/0x20"
}
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "n/a"
}
]
2025-05-02 16:00:49 +00:00
}
]
2025-05-02 16:02:18 +00:00
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"vendor_name" : "Linux" ,
"product" : {
"product_data" : [
{
"product_name" : "Linux" ,
"version" : {
"version_data" : [
{
"version_affected" : "<" ,
"version_name" : "bc07c10a3603a5ab3ef01ba42b3d41f9ac63d1b6" ,
"version_value" : "407badf73ec9fb0d5744bf2ca1745c1818aa222f"
} ,
{
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
"versions" : [
{
"version" : "4.4" ,
"status" : "affected"
} ,
{
"version" : "0" ,
"lessThan" : "4.4" ,
"status" : "unaffected" ,
"versionType" : "semver"
} ,
{
"version" : "5.15.104" ,
"lessThanOrEqual" : "5.15.*" ,
"status" : "unaffected" ,
"versionType" : "semver"
} ,
{
"version" : "6.1.21" ,
"lessThanOrEqual" : "6.1.*" ,
"status" : "unaffected" ,
"versionType" : "semver"
} ,
{
"version" : "6.2.8" ,
"lessThanOrEqual" : "6.2.*" ,
"status" : "unaffected" ,
"versionType" : "semver"
} ,
{
"version" : "6.3" ,
"lessThanOrEqual" : "*" ,
"status" : "unaffected" ,
"versionType" : "original_commit_for_fix"
}
] ,
"defaultStatus" : "affected"
}
}
]
}
}
]
}
}
]
}
} ,
"references" : {
"reference_data" : [
{
"url" : "https://git.kernel.org/stable/c/407badf73ec9fb0d5744bf2ca1745c1818aa222f" ,
"refsource" : "MISC" ,
"name" : "https://git.kernel.org/stable/c/407badf73ec9fb0d5744bf2ca1745c1818aa222f"
} ,
{
"url" : "https://git.kernel.org/stable/c/e3fda704903f6d1fc351412f1bc6620333959ada" ,
"refsource" : "MISC" ,
"name" : "https://git.kernel.org/stable/c/e3fda704903f6d1fc351412f1bc6620333959ada"
} ,
{
"url" : "https://git.kernel.org/stable/c/6917395c4667cfb607ed8bf1826205a59414657c" ,
"refsource" : "MISC" ,
"name" : "https://git.kernel.org/stable/c/6917395c4667cfb607ed8bf1826205a59414657c"
} ,
{
"url" : "https://git.kernel.org/stable/c/9b0cb770f5d7b1ff40bea7ca385438ee94570eec" ,
"refsource" : "MISC" ,
"name" : "https://git.kernel.org/stable/c/9b0cb770f5d7b1ff40bea7ca385438ee94570eec"
}
]
} ,
"generator" : {
"engine" : "bippy-1.1.0"
2025-05-02 16:00:49 +00:00
}
}