In the Linux kernel, the following vulnerability has been resolved:
ublk: fail to start device if queue setup is interrupted
In ublkctrlstartdev(), if waitforcompletioninterruptible() is interrupted by signal, queues aren't setup successfully yet, so we have to fail UBLKCMDSTART_DEV, otherwise kernel oops can be triggered.
Reported by German when working on qemu-storage-deamon which requires single thread ublk daemon.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53508.json"
}"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53508.json"
[
{
"id": "CVE-2023-53508-22fe458c",
"target": {
"file": "drivers/block/ublk_drv.c"
},
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6ab3e7d424cd413d7a5e976c8a30b4ffa84a65dd",
"digest": {
"threshold": 0.9,
"line_hashes": [
"288261470399946891083108655895596874466",
"57155560674146806201596608966051197570",
"288155167492575669690821877806863291545",
"114334375627299542811914418909351052613"
]
},
"signature_type": "Line"
},
{
"id": "CVE-2023-53508-380e24ba",
"target": {
"function": "ublk_ctrl_start_dev",
"file": "drivers/block/ublk_drv.c"
},
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6ab3e7d424cd413d7a5e976c8a30b4ffa84a65dd",
"digest": {
"function_hash": "287619043103880566538165548711195746514",
"length": 1329.0
},
"signature_type": "Function"
},
{
"id": "CVE-2023-53508-401c0c7e",
"target": {
"file": "drivers/block/ublk_drv.c"
},
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@53e7d08f6d6e214c40db1f51291bb2975c789dc2",
"digest": {
"threshold": 0.9,
"line_hashes": [
"288261470399946891083108655895596874466",
"57155560674146806201596608966051197570",
"288155167492575669690821877806863291545",
"114334375627299542811914418909351052613"
]
},
"signature_type": "Line"
},
{
"id": "CVE-2023-53508-c2371a48",
"target": {
"file": "drivers/block/ublk_drv.c"
},
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0d5916c439574b18a0734872daa0022b3d6105ad",
"digest": {
"threshold": 0.9,
"line_hashes": [
"288261470399946891083108655895596874466",
"57155560674146806201596608966051197570",
"288155167492575669690821877806863291545",
"114334375627299542811914418909351052613"
]
},
"signature_type": "Line"
},
{
"id": "CVE-2023-53508-cbfaa526",
"target": {
"function": "ublk_ctrl_start_dev",
"file": "drivers/block/ublk_drv.c"
},
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@53e7d08f6d6e214c40db1f51291bb2975c789dc2",
"digest": {
"function_hash": "287619043103880566538165548711195746514",
"length": 1329.0
},
"signature_type": "Function"
},
{
"id": "CVE-2023-53508-d32a34cc",
"target": {
"function": "ublk_ctrl_start_dev",
"file": "drivers/block/ublk_drv.c"
},
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0d5916c439574b18a0734872daa0022b3d6105ad",
"digest": {
"function_hash": "139241175169425475895937375109046778469",
"length": 1325.0
},
"signature_type": "Function"
}
]