CVE-2023-52787

In the Linux kernel, the following vulnerability has been resolved: blk-mq: make sure active queue usage is held for bio_integrity_prep() blk_integrity_unregister() can come if queue usage counter isn't held for one bio with integrity prepared, so this request may be completed with calling profile->complete_fn, then kernel panic. Another constraint is that bio_integrity_prep() needs to be called before bio merge. Fix the issue by: - call bio_integrity_prep() with one queue usage counter grabbed reliably - call bio_integrity_prep() before bio merge
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.7:rc1:*:*:*:*:*:*

History

26 Sep 2025, 16:23

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/b0077e269f6c152e807fdac90b58caf012cdbaab - () https://git.kernel.org/stable/c/b0077e269f6c152e807fdac90b58caf012cdbaab - Patch
References () https://git.kernel.org/stable/c/b5c8e0ff76d10f6bf70a7237678f27c20cf59bc9 - () https://git.kernel.org/stable/c/b5c8e0ff76d10f6bf70a7237678f27c20cf59bc9 - Patch
References () https://git.kernel.org/stable/c/b80056bd75a16e4550873ecefe12bc8fd190b1cf - () https://git.kernel.org/stable/c/b80056bd75a16e4550873ecefe12bc8fd190b1cf - Patch
References () https://git.kernel.org/stable/c/e9c309ded295b7f8849097d71ae231456ca79f78 - () https://git.kernel.org/stable/c/e9c309ded295b7f8849097d71ae231456ca79f78 - Patch
CWE NVD-CWE-noinfo
First Time Linux
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:6.7:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

Information

Published : 2024-05-21 16:15

Updated : 2025-09-26 16:23


NVD link : CVE-2023-52787

Mitre link : CVE-2023-52787

CVE.ORG link : CVE-2023-52787


JSON object : View

Products Affected

linux

  • linux_kernel