-

CVE-2023-53461

In the Linux kernel, the following vulnerability has been resolved:

io_uring: wait interruptibly for request completions on exit

WHen the ring exits, cleanup is done and the final cancelation and
waiting on completions is done by io_ring_exit_work. That function is
invoked by kworker, which doesn't take any signals. Because of that, it
doesn't really matter if we wait for completions in TASK_INTERRUPTIBLE
or TASK_UNINTERRUPTIBLE state. However, it does matter to the hung task
detection checker!

Normally we expect cancelations and completions to happen rather
quickly. Some test cases, however, will exit the ring and park the
owning task stopped (eg via SIGSTOP). If the owning task needs to run
task_work to complete requests, then io_ring_exit_work won't make any
progress until the task is runnable again. Hence io_ring_exit_work can
trigger the hung task detection, which is particularly problematic if
panic-on-hung-task is enabled.

As the ring exit doesn't take signals to begin with, have it wait
interruptibly rather than uninterruptibly. io_uring has a separate
stuck-exit warning that triggers independently anyway, so we're not
really missing anything by making this switch.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < 28e649dc9947e6525c95e32aa9a8e147925e3f56
Version 2b188cc1bb857a9d4701ae59aa7768b5124e262e
Status affected
Version < 8e29835366138389bfad3b31ea06960d0a77bf77
Version 2b188cc1bb857a9d4701ae59aa7768b5124e262e
Status affected
Version < b50d6e06cca7b67a3d73ca660dda27662b76e6ea
Version 2b188cc1bb857a9d4701ae59aa7768b5124e262e
Status affected
Version < 58e80cb68b057e974768792c34708c6957810486
Version 2b188cc1bb857a9d4701ae59aa7768b5124e262e
Status affected
Version < 4826c59453b3b4677d6bf72814e7ababdea86949
Version 2b188cc1bb857a9d4701ae59aa7768b5124e262e
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 5.1
Status affected
Version < 5.1
Version 0
Status unaffected
Version <= 5.10.*
Version 5.10.188
Status unaffected
Version <= 5.15.*
Version 5.15.121
Status unaffected
Version <= 6.1.*
Version 6.1.39
Status unaffected
Version <= 6.4.*
Version 6.4.4
Status unaffected
Version <= *
Version 6.5
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.02% 0.05
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string