CVE-2023-53860
BaseFortify
Publication date: 2025-12-09
Last updated on: 2025-12-09
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.6.0-rc1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's device mapper (dm) involves improper handling of IO requests under RCU (Read-Copy-Update) protection. The kernel incorrectly assumes that IO requests marked with REQ_NOWAIT can be submitted while under RCU read lock protection without risk. However, REQ_NOWAIT only means the request should not sleep waiting on other IO, but it can still cause scheduling, which is unsafe under RCU protection. This can lead to kernel bugs such as sleeping functions being called from invalid contexts, causing system instability or crashes.
How can this vulnerability impact me? :
This vulnerability can cause kernel instability or crashes when certain IO operations are performed, potentially leading to denial of service or system reliability issues. It may affect systems using the device mapper functionality in the Linux kernel, especially when performing direct IO operations with the REQ_NOWAIT flag, resulting in unexpected kernel bugs and system faults.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by running the provided test case code that attempts to perform a direct IO read with the RWF_NOWAIT flag on /dev/dm-0. If the system is vulnerable, it will produce a kernel BUG message indicating a sleeping function called from invalid context. The test case involves opening /dev/dm-0 with O_DIRECT and calling preadv2 with RWF_NOWAIT. There is no specific network detection method described.
What immediate steps should I take to mitigate this vulnerability?
The provided text does not specify immediate mitigation steps. However, since the vulnerability is resolved in a Linux kernel update, the recommended action is to update the Linux kernel to a version that includes the fix for this issue.