CVE-2023-53421

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-53421
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53421.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-53421
Downstream
Related
Published
2025-09-18T16:04:04Z
Modified
2025-10-21T17:03:10.676399Z
Summary
blk-cgroup: Reinit blkg_iostat_set after clearing in blkcg_reset_stats()
Details

In the Linux kernel, the following vulnerability has been resolved:

blk-cgroup: Reinit blkgiostatset after clearing in blkcgresetstats()

When blkgalloc() is called to allocate a blkcggq structure with the associated blkgiostatset's, there are 2 fields within blkgiostatset that requires proper initialization - blkg & sync. The former field was introduced by commit 3b8cc6298724 ("blk-cgroup: Optimize blkcgrstatflush()") while the later one was introduced by commit f73316482977 ("blk-cgroup: reimplement basic IO stats using cgroup rstat").

Unfortunately those fields in the blkgiostatset's are not properly re-initialized when they are cleared in v1's blkcgresetstats(). This can lead to a kernel panic due to NULL pointer access of the blkg pointer. The missing initialization of sync is less problematic and can be a problem in a debug kernel due to missing lockdep initialization.

Fix these problems by re-initializing them after memory clearing.

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
f73316482977ac401ac37245c9df48079d4e11f3
Fixed
b0d26283af612b9e0cc3188b0b88ad7fdea447e8
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
f73316482977ac401ac37245c9df48079d4e11f3
Fixed
abbce7f82613ea5eeefd0fc3c1c8e449b9cef2a2
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
f73316482977ac401ac37245c9df48079d4e11f3
Fixed
3d2af77e31ade05ff7ccc3658c3635ec1bea0979

Affected versions

v5.*

v5.10
v5.10-rc1
v5.10-rc2
v5.10-rc3
v5.10-rc4
v5.10-rc5
v5.10-rc6
v5.10-rc7
v5.11
v5.11-rc1
v5.11-rc2
v5.11-rc3
v5.11-rc4
v5.11-rc5
v5.11-rc6
v5.11-rc7
v5.12
v5.12-rc1
v5.12-rc1-dontuse
v5.12-rc2
v5.12-rc3
v5.12-rc4
v5.12-rc5
v5.12-rc6
v5.12-rc7
v5.12-rc8
v5.13
v5.13-rc1
v5.13-rc2
v5.13-rc3
v5.13-rc4
v5.13-rc5
v5.13-rc6
v5.13-rc7
v5.14
v5.14-rc1
v5.14-rc2
v5.14-rc3
v5.14-rc4
v5.14-rc5
v5.14-rc6
v5.14-rc7
v5.15
v5.15-rc1
v5.15-rc2
v5.15-rc3
v5.15-rc4
v5.15-rc5
v5.15-rc6
v5.15-rc7
v5.16
v5.16-rc1
v5.16-rc2
v5.16-rc3
v5.16-rc4
v5.16-rc5
v5.16-rc6
v5.16-rc7
v5.16-rc8
v5.17
v5.17-rc1
v5.17-rc2
v5.17-rc3
v5.17-rc4
v5.17-rc5
v5.17-rc6
v5.17-rc7
v5.17-rc8
v5.18
v5.18-rc1
v5.18-rc2
v5.18-rc3
v5.18-rc4
v5.18-rc5
v5.18-rc6
v5.18-rc7
v5.19
v5.19-rc1
v5.19-rc2
v5.19-rc3
v5.19-rc4
v5.19-rc5
v5.19-rc6
v5.19-rc7
v5.19-rc8
v5.4
v5.4-rc6
v5.4-rc7
v5.4-rc8
v5.5
v5.5-rc1
v5.5-rc2
v5.5-rc3
v5.5-rc4
v5.5-rc5
v5.5-rc6
v5.5-rc7
v5.6
v5.6-rc1
v5.6-rc2
v5.6-rc3
v5.6-rc4
v5.6-rc5
v5.6-rc6
v5.6-rc7
v5.7
v5.7-rc1
v5.7-rc2
v5.7-rc3
v5.7-rc4
v5.7-rc5
v5.7-rc6
v5.7-rc7
v5.8
v5.8-rc1
v5.8-rc2
v5.8-rc3
v5.8-rc4
v5.8-rc5
v5.8-rc6
v5.8-rc7
v5.9
v5.9-rc1
v5.9-rc2
v5.9-rc3
v5.9-rc4
v5.9-rc5
v5.9-rc6
v5.9-rc7
v5.9-rc8

v6.*

v6.0
v6.0-rc1
v6.0-rc2
v6.0-rc3
v6.0-rc4
v6.0-rc5
v6.0-rc6
v6.0-rc7
v6.1
v6.1-rc1
v6.1-rc2
v6.1-rc3
v6.1-rc4
v6.1-rc5
v6.1-rc6
v6.1-rc7
v6.1-rc8
v6.2
v6.2-rc1
v6.2-rc2
v6.2-rc3
v6.2-rc4
v6.2-rc5
v6.2-rc6
v6.2-rc7
v6.2-rc8
v6.3
v6.3-rc1
v6.3-rc2
v6.3-rc3
v6.3-rc4
v6.3-rc5
v6.3-rc6
v6.3-rc7
v6.3.1
v6.3.10
v6.3.11
v6.3.12
v6.3.2
v6.3.3
v6.3.4
v6.3.5
v6.3.6
v6.3.7
v6.3.8
v6.3.9
v6.4
v6.4-rc1
v6.4-rc2
v6.4-rc3
v6.4-rc4
v6.4-rc5
v6.4-rc6
v6.4-rc7
v6.4.1
v6.4.2
v6.4.3

Database specific

vanir_signatures

[
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3d2af77e31ade05ff7ccc3658c3635ec1bea0979",
        "target": {
            "file": "block/blk-cgroup.c"
        },
        "deprecated": false,
        "id": "CVE-2023-53421-50e4cae1",
        "signature_version": "v1",
        "signature_type": "Line",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "290014902569720783643080683492689243244",
                "120265781749003002339414864443251398349",
                "64370558120763108421131524262904331666",
                "139968794562554890116676860910266164692",
                "89563489777820433419718449536727250593",
                "117079074273518157438732668390719838026"
            ]
        }
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3d2af77e31ade05ff7ccc3658c3635ec1bea0979",
        "target": {
            "function": "blkcg_reset_stats",
            "file": "block/blk-cgroup.c"
        },
        "deprecated": false,
        "id": "CVE-2023-53421-82886a79",
        "signature_version": "v1",
        "signature_type": "Function",
        "digest": {
            "length": 724.0,
            "function_hash": "157848674336094183397908253190475619184"
        }
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@abbce7f82613ea5eeefd0fc3c1c8e449b9cef2a2",
        "target": {
            "file": "block/blk-cgroup.c"
        },
        "deprecated": false,
        "id": "CVE-2023-53421-c785463d",
        "signature_version": "v1",
        "signature_type": "Line",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "290014902569720783643080683492689243244",
                "120265781749003002339414864443251398349",
                "64370558120763108421131524262904331666",
                "139968794562554890116676860910266164692",
                "89563489777820433419718449536727250593",
                "117079074273518157438732668390719838026"
            ]
        }
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b0d26283af612b9e0cc3188b0b88ad7fdea447e8",
        "target": {
            "file": "block/blk-cgroup.c"
        },
        "deprecated": false,
        "id": "CVE-2023-53421-dcf510bd",
        "signature_version": "v1",
        "signature_type": "Line",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "290014902569720783643080683492689243244",
                "120265781749003002339414864443251398349",
                "64370558120763108421131524262904331666",
                "139968794562554890116676860910266164692",
                "89563489777820433419718449536727250593",
                "117079074273518157438732668390719838026"
            ]
        }
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b0d26283af612b9e0cc3188b0b88ad7fdea447e8",
        "target": {
            "function": "blkcg_reset_stats",
            "file": "block/blk-cgroup.c"
        },
        "deprecated": false,
        "id": "CVE-2023-53421-f12b4955",
        "signature_version": "v1",
        "signature_type": "Function",
        "digest": {
            "length": 724.0,
            "function_hash": "157848674336094183397908253190475619184"
        }
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@abbce7f82613ea5eeefd0fc3c1c8e449b9cef2a2",
        "target": {
            "function": "blkcg_reset_stats",
            "file": "block/blk-cgroup.c"
        },
        "deprecated": false,
        "id": "CVE-2023-53421-fdc4534f",
        "signature_version": "v1",
        "signature_type": "Function",
        "digest": {
            "length": 724.0,
            "function_hash": "157848674336094183397908253190475619184"
        }
    }
]

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
6.3.13
Type
ECOSYSTEM
Events
Introduced
6.4.0
Fixed
6.4.4