In the Linux kernel, the following vulnerability has been resolved:
loop: Fix use-after-free issues
do_req_filebacked() calls blk_mq_complete_request() synchronously or
asynchronously when using asynchronous I/O unless memory allocation fails.
Hence, modify loop_handle_cmd() such that it does not dereference 'cmd' nor
'rq' after do_req_filebacked() finished unless we are sure that the request
has not yet been completed. This patch fixes the following kernel crash:
Unable to handle kernel NULL pointer dereference at virtual address 0000000000000054
Call trace:
css_put.42938+0x1c/0x1ac
loop_process_work+0xc8c/0xfd4
loop_rootcg_workfn+0x24/0x34
process_one_work+0x244/0x558
worker_thread+0x400/0x8fc
kthread+0x16c/0x1e0
ret_from_fork+0x10/0x20
References
Configurations
Configuration 1 (hide)
|
History
10 Nov 2025, 17:53
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:linux:linux_kernel:6.3:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.3:rc1:*:*:*:*:*:* |
|
| References | () https://git.kernel.org/stable/c/407badf73ec9fb0d5744bf2ca1745c1818aa222f - Patch | |
| References | () https://git.kernel.org/stable/c/6917395c4667cfb607ed8bf1826205a59414657c - Patch | |
| References | () https://git.kernel.org/stable/c/9b0cb770f5d7b1ff40bea7ca385438ee94570eec - Patch | |
| References | () https://git.kernel.org/stable/c/e3fda704903f6d1fc351412f1bc6620333959ada - Patch | |
| First Time |
Linux
Linux linux Kernel |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
| CWE | CWE-416 |
05 May 2025, 20:54
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
02 May 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-05-02 16:15
Updated : 2025-11-10 17:53
NVD link : CVE-2023-53111
Mitre link : CVE-2023-53111
CVE.ORG link : CVE-2023-53111
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free
