CVE-2023-53231
BaseFortify
Publication date: 2025-09-15
Last updated on: 2025-12-04
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 4.19 (inc) to 6.4.7 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's erofs filesystem where the detection of atomic context was insufficient. Specifically, the function z_erofs_decompressqueue_endio can be called under an rcu lock, which was not properly accounted for in the original atomic context check. This could cause the system to attempt synchronous decompression in an invalid context, potentially leading to kernel bugs such as sleeping in atomic context. The patch fixes this by improving the detection mechanism to check for rcu_read_lock_any_held() and using a more appropriate context check (!in_task() instead of in_atomic()).
How can this vulnerability impact me? :
This vulnerability can cause kernel instability or crashes due to improper handling of decompression work in invalid contexts. Specifically, it may lead to kernel bugs where sleeping functions are called from atomic contexts, which is not allowed and can cause system crashes or unpredictable behavior. This impacts system reliability and could disrupt normal operation.