๐Ÿ” CVE Alert

CVE-2023-53820

UNKNOWN 0.0

loop: loop_set_status_from_info() check before assignment

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: loop: loop_set_status_from_info() check before assignment In loop_set_status_from_info(), lo->lo_offset and lo->lo_sizelimit should be checked before reassignment, because if an overflow error occurs, the original correct value will be changed to the wrong value, and it will not be changed back. More, the original patch did not solve the problem, the value was set and ioctl returned an error, but the subsequent io used the value in the loop driver, which still caused an alarm: loop_handle_cmd do_req_filebacked loff_t pos = ((loff_t) blk_rq_pos(rq) << 9) + lo->lo_offset; lo_rw_aio cmd->iocb.ki_pos = pos

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Dec 9, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
2035c770bfdbcc82bd52e05871a7c82db9529e0f < 6bdf4e6dfb60cbb6121ccf027d97ed2ec97c0bcb a217715338fd48f72114725aa7a40e484a781ca7 < 832580af82ace363205039a8e7c4ef04552ccc1a 13b2856037a651ba3ab4a8b25ecab3e791926da3 < 2ea7077748e5d7cc64f1c31342c802fe66ea7426 b40877b8562c5720d0a7fce20729f56b75a3dede < 861021710bba9dfa0749a3c209a6c1773208b1f1 6858933131d0dadac071c4d33335a9ea4b8e76cf < c79a924ed6afac1708dfd370ba66bcf6a852ced6 0455bef69028c65065f16bb04635591b2374249b < 3e7d0968203d668af6036b9f9199c7b62c8a3581 c490a0b5a4f36da3918181a8acdc6991d967c5f3 < 4be26d553a3f1d4f54f25353d1496c562002126d c490a0b5a4f36da3918181a8acdc6991d967c5f3 < 258809bf22bf71d53247856f374f2b1d055f2fd4 c490a0b5a4f36da3918181a8acdc6991d967c5f3 < 9f6ad5d533d1c71e51bdd06a5712c4fbc8768dfa 18e28817cb516b39de6281f6db9b0618b2cc7b42 adf0112d9b8acb03485624220b4934f69bf13369 9be7fa7ead18a48940df7b59d993bbc8b9055c15
Linux / Linux
6.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/6bdf4e6dfb60cbb6121ccf027d97ed2ec97c0bcb git.kernel.org: https://git.kernel.org/stable/c/832580af82ace363205039a8e7c4ef04552ccc1a git.kernel.org: https://git.kernel.org/stable/c/2ea7077748e5d7cc64f1c31342c802fe66ea7426 git.kernel.org: https://git.kernel.org/stable/c/861021710bba9dfa0749a3c209a6c1773208b1f1 git.kernel.org: https://git.kernel.org/stable/c/c79a924ed6afac1708dfd370ba66bcf6a852ced6 git.kernel.org: https://git.kernel.org/stable/c/3e7d0968203d668af6036b9f9199c7b62c8a3581 git.kernel.org: https://git.kernel.org/stable/c/4be26d553a3f1d4f54f25353d1496c562002126d git.kernel.org: https://git.kernel.org/stable/c/258809bf22bf71d53247856f374f2b1d055f2fd4 git.kernel.org: https://git.kernel.org/stable/c/9f6ad5d533d1c71e51bdd06a5712c4fbc8768dfa