CVE-2023-53832

Source
https://cve.org/CVERecord?id=CVE-2023-53832
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53832.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53832
Downstream
Related
Published
2025-12-09T01:29:47.513Z
Modified
2026-03-20T12:33:22.025609Z
Summary
md/raid10: fix null-ptr-deref in raid10_sync_request
Details

In the Linux kernel, the following vulnerability has been resolved:

md/raid10: fix null-ptr-deref in raid10syncrequest

initresync() inits mempool and sets conf->havereplacemnt at the beginning of sync, close_sync() frees the mempool when sync is completed.

After [1] recovery might be skipped and initresync() is called but closesync() is not. null-ptr-deref occurs with r10bio->dev[i].repl_bio.

The following is one way to reproduce the issue.

1) create a array, wait for resync to complete, mddev->recoverycp is set to MaxSector. 2) recovery is woken and it is skipped. conf->havereplacement is set to 0 in initresync(). closesync() not called. 3) some io errors and rdev A is set to WantReplacement. 4) a new device is added and set to A's replacement. 5) recovery is woken, A have replacement, but conf->havereplacemnt is 0. r10bio->dev[i].replbio will not be alloced and null-ptr-deref occurs.

Fix it by not calling init_resync() if recovery skipped.

[1] commit 7e83ccbecd60 ("md/raid10: Allow skipping recovery when clean arrays are assembled")

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53832.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
7e83ccbecd608b971f340e951c9e84cd0343002f
Fixed
38d33593260536840b49fd1dcac9aedfd14a9d42
Fixed
14964127be77884003976a392c9faa9ebaabbbe1
Fixed
bdbf104b1c91fbf38f82c522ebf75429f094292a
Fixed
68695084077e3de9d3e94e09238ace2b6f246446
Fixed
b50fd1c3d9d0175aa29ff2706ef36cc178bc356a
Fixed
99b503e4edc5938885d839cf0e7571963f75d800
Fixed
9e9efc77efd1956cc244af975240f2513d78a371
Fixed
a405c6f0229526160aa3f177f65e20c86fce84c5

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53832.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
3.10.0
Fixed
4.19.283
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.243
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.180
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.111
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.28
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.2.15
Type
ECOSYSTEM
Events
Introduced
6.3.0
Fixed
6.3.2

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53832.json"