CVE-2023-53613

Source
https://cve.org/CVERecord?id=CVE-2023-53613
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53613.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53613
Downstream
Related
Published
2025-10-04T15:44:20.998Z
Modified
2026-04-11T12:46:50.158014Z
Summary
dax: Fix dax_mapping_release() use after free
Details

In the Linux kernel, the following vulnerability has been resolved:

dax: Fix daxmappingrelease() use after free

A CONFIGDEBUGKOBJECTRELEASE test of removing a device-dax region provider (like modprobe -r daxhmem) yields:

kobject: 'mapping0' (ffff93eb460e8800): kobjectrelease, parent 0000000000000000 (delayed 2000) [..] DEBUGLOCKSWARNON(1) WARNING: CPU: 23 PID: 282 at kernel/locking/lockdep.c:232 __lock_acquire+0x9fc/0x2260 [..] RIP: 0010:__lockacquire+0x9fc/0x2260 [..] Call Trace: <TASK> [..] lockacquire+0xd4/0x2c0 ? idafree+0x62/0x130 rawspinlockirqsave+0x47/0x70 ? idafree+0x62/0x130 idafree+0x62/0x130 daxmappingrelease+0x1f/0x30 devicerelease+0x36/0x90 kobjectdelayedcleanup+0x46/0x150

Due to attempting idafree() on an ida object that has already been freed. Devices typically only hold a reference on their parent while registered. If a child needs a parent object to complete its release it needs to hold a reference that it drops from its release callback. Arrange for a daxmapping to pin its parent devdax instance until daxmapping_release().

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53613.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0b07ce872a9eca1ff88c0eb7f6e92dde127d21ca
Fixed
94a85474f5e3e518bdbf8c9f51cb343d734a04f7
Fixed
9c2f993b6ca903c030d58451b5bf9ea27d0d17fa
Fixed
03859868ab82d57bfdd0cea1bf31f9319a5dded0
Fixed
f76db6781d76d8464ec2faa9752cc3fb2e4f6923
Fixed
7310b84821f043dcf77d5e6aa0ad55dc1e10a11d
Fixed
6d24b170a9db0456f577b1ab01226a2254c016a8

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53613.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.10.0
Fixed
5.10.188
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.121
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.39
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.3.13
Type
ECOSYSTEM
Events
Introduced
6.4.0
Fixed
6.4.4

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53613.json"