{"id":"CVE-2023-53848","summary":"md/raid5-cache: fix a deadlock in r5l_exit_log()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nmd/raid5-cache: fix a deadlock in r5l_exit_log()\n\nCommit b13015af94cf (\"md/raid5-cache: Clear conf-\u003elog after finishing\nwork\") introduce a new problem:\n\n// caller hold reconfig_mutex\nr5l_exit_log\n flush_work(&log-\u003edisable_writeback_work)\n\t\t\tr5c_disable_writeback_async\n\t\t\t wait_event\n\t\t\t  /*\n\t\t\t   * conf-\u003elog is not NULL, and mddev_trylock()\n\t\t\t   * will fail, wait_event() can never pass.\n\t\t\t   */\n conf-\u003elog = NULL\n\nFix this problem by setting 'config-\u003elog' to NULL before wake_up() as it\nused to be, so that wait_event() from r5c_disable_writeback_async() can\nexist. In the meantime, move forward md_unregister_thread() so that\nnull-ptr-deref this commit fixed can still be fixed.","modified":"2026-03-31T17:29:55.460105728Z","published":"2025-12-09T01:30:11.895Z","related":["SUSE-SU-2026:0263-1","SUSE-SU-2026:0278-1","SUSE-SU-2026:0281-1","SUSE-SU-2026:0293-1","SUSE-SU-2026:0315-1","SUSE-SU-2026:0317-1","SUSE-SU-2026:20477-1","SUSE-SU-2026:20498-1","SUSE-SU-2026:20845-1","SUSE-SU-2026:20876-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53848.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/71cf23271f015a57038bdc4669952096f9fe5500"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a705b11b358dee677aad80630e7608b2d5f56691"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ac9e103f282a7854f3274ef5ff0742fbbe8d7d6b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c406984738215dc20ac2dc63e49d70f20797730e"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53848.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53848"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"b13015af94cf405f73ff64ce0797269554020c37"},{"fixed":"ac9e103f282a7854f3274ef5ff0742fbbe8d7d6b"},{"fixed":"71cf23271f015a57038bdc4669952096f9fe5500"},{"fixed":"c406984738215dc20ac2dc63e49d70f20797730e"},{"fixed":"a705b11b358dee677aad80630e7608b2d5f56691"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53848.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"6.0.0"},{"fixed":"6.1.53"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.4.16"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.5.0"},{"fixed":"6.5.3"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53848.json"}}],"schema_version":"1.7.5"}