CVE-2023-52903

Source
https://cve.org/CVERecord?id=CVE-2023-52903
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52903.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-52903
Downstream
Published
2024-08-21T06:10:43.857Z
Modified
2026-04-11T11:57:14.990152Z
Summary
io_uring: lock overflowing for IOPOLL
Details

In the Linux kernel, the following vulnerability has been resolved:

io_uring: lock overflowing for IOPOLL

syzbot reports an issue with overflow filling for IOPOLL:

WARNING: CPU: 0 PID: 28 at iouring/iouring.c:734 iocqringeventoverflow+0x1c0/0x230 iouring/iouring.c:734 CPU: 0 PID: 28 Comm: kworker/u4:1 Not tainted 6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0 Workqueue: eventsunbound ioringexitwork Call trace:  iocqringeventoverflow+0x1c0/0x230 iouring/iouring.c:734  ioreqcqeoverflow+0x5c/0x70 iouring/iouring.c:773  iofillcqereq iouring/iouring.h:168 [inline]  iodoiopoll+0x474/0x62c iouring/rw.c:1065  ioiopolltryreapevents+0x6c/0x108 iouring/iouring.c:1513  iouringtrycancelrequests+0x13c/0x258 iouring/iouring.c:3056  ioringexitwork+0xec/0x390 iouring/iouring.c:2869  processonework+0x2d8/0x504 kernel/workqueue.c:2289  workerthread+0x340/0x610 kernel/workqueue.c:2436  kthread+0x12c/0x158 kernel/kthread.c:376  retfrom_fork+0x10/0x20 arch/arm64/kernel/entry.S:863

There is no real problem for normal IOPOLL as flush is also called with uring_lock taken, but it's getting more complicated for IOPOLL|SQPOLL, for which _iocqringoverflowflush() happens from the CQ waiting path.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52903.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
2b188cc1bb857a9d4701ae59aa7768b5124e262e
Fixed
de77faee280163ff03b7ab64af6c9d779a43d4c4
Fixed
ed4629d1e968359fbb91d0a3780b1e86a2c08845
Fixed
7fc3990dad04a677606337ebc61964094d6cb41b
Fixed
544d163d659d45a206d8929370d5a2984e546cb7

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52903.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.1.0
Fixed
5.10.165
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.89
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.7

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52903.json"