In the Linux kernel, the following vulnerability has been resolved:
ublk: fail to recover device if queue setup is interrupted
In ublkctrlendrecovery(), if waitforcompletioninterruptible() is interrupted by signal, queues aren't setup successfully yet, so we have to fail UBLKCMDENDUSERRECOVERY, otherwise kernel oops can be triggered.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53207.json"
}"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53207.json"
[
{
"id": "CVE-2023-53207-06a451d2",
"target": {
"function": "ublk_ctrl_end_recovery",
"file": "drivers/block/ublk_drv.c"
},
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b3a1e243a74632f88b22e713f1c7256754017d58",
"digest": {
"function_hash": "138546972112524146591418317705809894072",
"length": 1121.0
},
"signature_type": "Function"
},
{
"id": "CVE-2023-53207-90bc3134",
"target": {
"file": "drivers/block/ublk_drv.c"
},
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@84415f934ad4e96f3507fd09b831953d60fb04ec",
"digest": {
"threshold": 0.9,
"line_hashes": [
"9668140222944045661829123783755175475",
"141130709407349014883666390148100690954",
"7734420627537967558079604558566679985",
"282364958983129792327069215251321151985"
]
},
"signature_type": "Line"
},
{
"id": "CVE-2023-53207-9d7ed750",
"target": {
"function": "ublk_ctrl_end_recovery",
"file": "drivers/block/ublk_drv.c"
},
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0c0cbd4ebc375ceebc75c89df04b74f215fab23a",
"digest": {
"function_hash": "138546972112524146591418317705809894072",
"length": 1121.0
},
"signature_type": "Function"
},
{
"id": "CVE-2023-53207-b9b32ca1",
"target": {
"file": "drivers/block/ublk_drv.c"
},
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b3a1e243a74632f88b22e713f1c7256754017d58",
"digest": {
"threshold": 0.9,
"line_hashes": [
"9668140222944045661829123783755175475",
"141130709407349014883666390148100690954",
"7734420627537967558079604558566679985",
"282364958983129792327069215251321151985"
]
},
"signature_type": "Line"
},
{
"id": "CVE-2023-53207-c96c978c",
"target": {
"function": "ublk_ctrl_end_recovery",
"file": "drivers/block/ublk_drv.c"
},
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@84415f934ad4e96f3507fd09b831953d60fb04ec",
"digest": {
"function_hash": "76657333738828190761420782136765480393",
"length": 1116.0
},
"signature_type": "Function"
},
{
"id": "CVE-2023-53207-eb0fe691",
"target": {
"file": "drivers/block/ublk_drv.c"
},
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0c0cbd4ebc375ceebc75c89df04b74f215fab23a",
"digest": {
"threshold": 0.9,
"line_hashes": [
"9668140222944045661829123783755175475",
"141130709407349014883666390148100690954",
"7734420627537967558079604558566679985",
"282364958983129792327069215251321151985"
]
},
"signature_type": "Line"
}
]