CVE-2023-53823
BaseFortify
Publication date: 2025-12-09
Last updated on: 2025-12-09
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel relates to concurrency issues in the block request quality of service (rq_qos) APIs. Specifically, the lack of proper locking allows unsafe concurrent access to rq_qos structures when enabling certain cgroup policies like iocost or iolatency. This can lead to null pointer dereferences and memory leaks during disk removal and cgroup configuration changes. The fix introduces a new disk-level mutex 'rq_qos_mutex' to protect rq_qos_exit() and synchronize rq_qos_add() calls, preventing these unsafe concurrent operations.
How can this vulnerability impact me? :
This vulnerability can cause system instability or crashes due to null pointer dereferences and memory leaks when managing disk devices and cgroup policies related to block I/O scheduling. It may lead to unexpected behavior or resource exhaustion in systems using affected Linux kernel versions, especially when enabling iocost or iolatency cgroup policies.
What immediate steps should I take to mitigate this vulnerability?
Apply the patch that adds the new disk level mutex 'rq_qos_mutex' to the Linux kernel, which protects rq_qos APIs and prevents race conditions and memory leaks related to rq_qos_add() and rq_qos_exit(). This involves updating the kernel to a version that includes the commit 50e34d78815e or later.