CVE-2023-53820 (GCVE-0-2023-53820)

Vulnerability from cvelistv5 – Published: 2025-12-09 01:24 – Updated: 2025-12-23 16:39
VLAI?
Title
loop: loop_set_status_from_info() check before assignment
Summary
In the Linux kernel, the following vulnerability has been resolved: loop: loop_set_status_from_info() check before assignment In loop_set_status_from_info(), lo->lo_offset and lo->lo_sizelimit should be checked before reassignment, because if an overflow error occurs, the original correct value will be changed to the wrong value, and it will not be changed back. More, the original patch did not solve the problem, the value was set and ioctl returned an error, but the subsequent io used the value in the loop driver, which still caused an alarm: loop_handle_cmd do_req_filebacked loff_t pos = ((loff_t) blk_rq_pos(rq) << 9) + lo->lo_offset; lo_rw_aio cmd->iocb.ki_pos = pos
Severity ?
No CVSS data available.
Assigner
Impacted products
Vendor Product Version
Linux Linux Affected: 2035c770bfdbcc82bd52e05871a7c82db9529e0f , < 6bdf4e6dfb60cbb6121ccf027d97ed2ec97c0bcb (git)
Affected: a217715338fd48f72114725aa7a40e484a781ca7 , < 832580af82ace363205039a8e7c4ef04552ccc1a (git)
Affected: 13b2856037a651ba3ab4a8b25ecab3e791926da3 , < 2ea7077748e5d7cc64f1c31342c802fe66ea7426 (git)
Affected: b40877b8562c5720d0a7fce20729f56b75a3dede , < 861021710bba9dfa0749a3c209a6c1773208b1f1 (git)
Affected: 6858933131d0dadac071c4d33335a9ea4b8e76cf , < c79a924ed6afac1708dfd370ba66bcf6a852ced6 (git)
Affected: 0455bef69028c65065f16bb04635591b2374249b , < 3e7d0968203d668af6036b9f9199c7b62c8a3581 (git)
Affected: c490a0b5a4f36da3918181a8acdc6991d967c5f3 , < 4be26d553a3f1d4f54f25353d1496c562002126d (git)
Affected: c490a0b5a4f36da3918181a8acdc6991d967c5f3 , < 258809bf22bf71d53247856f374f2b1d055f2fd4 (git)
Affected: c490a0b5a4f36da3918181a8acdc6991d967c5f3 , < 9f6ad5d533d1c71e51bdd06a5712c4fbc8768dfa (git)
Affected: 18e28817cb516b39de6281f6db9b0618b2cc7b42 (git)
Affected: adf0112d9b8acb03485624220b4934f69bf13369 (git)
Affected: 9be7fa7ead18a48940df7b59d993bbc8b9055c15 (git)
Create a notification for this product.
    Linux Linux Affected: 6.0
Unaffected: 0 , < 6.0 (semver)
Unaffected: 4.19.312 , ≤ 4.19.* (semver)
Unaffected: 5.4.274 , ≤ 5.4.* (semver)
Unaffected: 5.10.173 , ≤ 5.10.* (semver)
Unaffected: 5.15.100 , ≤ 5.15.* (semver)
Unaffected: 6.1.18 , ≤ 6.1.* (semver)
Unaffected: 6.2.5 , ≤ 6.2.* (semver)
Unaffected: 6.3 , ≤ * (original_commit_for_fix)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/block/loop.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "6bdf4e6dfb60cbb6121ccf027d97ed2ec97c0bcb",
              "status": "affected",
              "version": "2035c770bfdbcc82bd52e05871a7c82db9529e0f",
              "versionType": "git"
            },
            {
              "lessThan": "832580af82ace363205039a8e7c4ef04552ccc1a",
              "status": "affected",
              "version": "a217715338fd48f72114725aa7a40e484a781ca7",
              "versionType": "git"
            },
            {
              "lessThan": "2ea7077748e5d7cc64f1c31342c802fe66ea7426",
              "status": "affected",
              "version": "13b2856037a651ba3ab4a8b25ecab3e791926da3",
              "versionType": "git"
            },
            {
              "lessThan": "861021710bba9dfa0749a3c209a6c1773208b1f1",
              "status": "affected",
              "version": "b40877b8562c5720d0a7fce20729f56b75a3dede",
              "versionType": "git"
            },
            {
              "lessThan": "c79a924ed6afac1708dfd370ba66bcf6a852ced6",
              "status": "affected",
              "version": "6858933131d0dadac071c4d33335a9ea4b8e76cf",
              "versionType": "git"
            },
            {
              "lessThan": "3e7d0968203d668af6036b9f9199c7b62c8a3581",
              "status": "affected",
              "version": "0455bef69028c65065f16bb04635591b2374249b",
              "versionType": "git"
            },
            {
              "lessThan": "4be26d553a3f1d4f54f25353d1496c562002126d",
              "status": "affected",
              "version": "c490a0b5a4f36da3918181a8acdc6991d967c5f3",
              "versionType": "git"
            },
            {
              "lessThan": "258809bf22bf71d53247856f374f2b1d055f2fd4",
              "status": "affected",
              "version": "c490a0b5a4f36da3918181a8acdc6991d967c5f3",
              "versionType": "git"
            },
            {
              "lessThan": "9f6ad5d533d1c71e51bdd06a5712c4fbc8768dfa",
              "status": "affected",
              "version": "c490a0b5a4f36da3918181a8acdc6991d967c5f3",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "18e28817cb516b39de6281f6db9b0618b2cc7b42",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "adf0112d9b8acb03485624220b4934f69bf13369",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "9be7fa7ead18a48940df7b59d993bbc8b9055c15",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/block/loop.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "6.0"
            },
            {
              "lessThan": "6.0",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.19.*",
              "status": "unaffected",
              "version": "4.19.312",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.*",
              "status": "unaffected",
              "version": "5.4.274",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.173",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.100",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.18",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.2.*",
              "status": "unaffected",
              "version": "6.2.5",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.3",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.19.312",
                  "versionStartIncluding": "4.19.257",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.4.274",
                  "versionStartIncluding": "5.4.212",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.10.173",
                  "versionStartIncluding": "5.10.140",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.15.100",
                  "versionStartIncluding": "5.15.64",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.1.18",
                  "versionStartIncluding": "6.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.2.5",
                  "versionStartIncluding": "6.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.3",
                  "versionStartIncluding": "6.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "4.9.327",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "4.14.292",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "5.19.6",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nloop: loop_set_status_from_info() check before assignment\n\nIn loop_set_status_from_info(), lo-\u003elo_offset and lo-\u003elo_sizelimit should\nbe checked before reassignment, because if an overflow error occurs, the\noriginal correct value will be changed to the wrong value, and it will not\nbe changed back.\n\nMore, the original patch did not solve the problem, the value was set and\nioctl returned an error, but the subsequent io used the value in the loop\ndriver, which still caused an alarm:\n\nloop_handle_cmd\n do_req_filebacked\n  loff_t pos = ((loff_t) blk_rq_pos(rq) \u003c\u003c 9) + lo-\u003elo_offset;\n  lo_rw_aio\n   cmd-\u003eiocb.ki_pos = pos"
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-12-23T16:39:55.361Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/6bdf4e6dfb60cbb6121ccf027d97ed2ec97c0bcb"
        },
        {
          "url": "https://git.kernel.org/stable/c/832580af82ace363205039a8e7c4ef04552ccc1a"
        },
        {
          "url": "https://git.kernel.org/stable/c/2ea7077748e5d7cc64f1c31342c802fe66ea7426"
        },
        {
          "url": "https://git.kernel.org/stable/c/861021710bba9dfa0749a3c209a6c1773208b1f1"
        },
        {
          "url": "https://git.kernel.org/stable/c/c79a924ed6afac1708dfd370ba66bcf6a852ced6"
        },
        {
          "url": "https://git.kernel.org/stable/c/3e7d0968203d668af6036b9f9199c7b62c8a3581"
        },
        {
          "url": "https://git.kernel.org/stable/c/4be26d553a3f1d4f54f25353d1496c562002126d"
        },
        {
          "url": "https://git.kernel.org/stable/c/258809bf22bf71d53247856f374f2b1d055f2fd4"
        },
        {
          "url": "https://git.kernel.org/stable/c/9f6ad5d533d1c71e51bdd06a5712c4fbc8768dfa"
        }
      ],
      "title": "loop: loop_set_status_from_info() check before assignment",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2023-53820",
    "datePublished": "2025-12-09T01:24:29.417Z",
    "dateReserved": "2025-12-08T23:58:35.278Z",
    "dateUpdated": "2025-12-23T16:39:55.361Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2023-53820\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-12-09T16:17:20.760\",\"lastModified\":\"2025-12-23T17:15:45.987\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nloop: loop_set_status_from_info() check before assignment\\n\\nIn loop_set_status_from_info(), lo-\u003elo_offset and lo-\u003elo_sizelimit should\\nbe checked before reassignment, because if an overflow error occurs, the\\noriginal correct value will be changed to the wrong value, and it will not\\nbe changed back.\\n\\nMore, the original patch did not solve the problem, the value was set and\\nioctl returned an error, but the subsequent io used the value in the loop\\ndriver, which still caused an alarm:\\n\\nloop_handle_cmd\\n do_req_filebacked\\n  loff_t pos = ((loff_t) blk_rq_pos(rq) \u003c\u003c 9) + lo-\u003elo_offset;\\n  lo_rw_aio\\n   cmd-\u003eiocb.ki_pos = pos\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/258809bf22bf71d53247856f374f2b1d055f2fd4\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/2ea7077748e5d7cc64f1c31342c802fe66ea7426\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/3e7d0968203d668af6036b9f9199c7b62c8a3581\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/4be26d553a3f1d4f54f25353d1496c562002126d\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/6bdf4e6dfb60cbb6121ccf027d97ed2ec97c0bcb\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/832580af82ace363205039a8e7c4ef04552ccc1a\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/861021710bba9dfa0749a3c209a6c1773208b1f1\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/9f6ad5d533d1c71e51bdd06a5712c4fbc8768dfa\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/c79a924ed6afac1708dfd370ba66bcf6a852ced6\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…