CVE-2023-53233
BaseFortify
Publication date: 2025-09-15
Last updated on: 2025-12-04
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.8 (inc) to 5.10.176 (exc) |
| linux | linux_kernel | From 5.11 (inc) to 5.15.104 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 6.1.21 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.2.8 (exc) |
| linux | linux_kernel | 6.3 |
| linux | linux_kernel | 6.3 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-667 | The product does not properly acquire or release a lock on a resource, leading to unexpected resource state changes and behaviors. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a deadlock issue in the Linux kernel's SMC (Shared Memory Communications) subsystem. It occurs due to a circular locking dependency involving workqueues and mutexes, specifically triggered by the cancel_delayed_work_syn() function. This deadlock can cause the kernel to hang or become unresponsive when certain locks are acquired in an unsafe order.
How can this vulnerability impact me? :
The deadlock can cause the Linux kernel to hang or freeze, potentially leading to system instability or denial of service. This can affect the availability of systems running vulnerable kernel versions, especially those using the SMC networking features.