CVE-2023-53419
BaseFortify
Publication date: 2025-09-18
Last updated on: 2025-12-11
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | to 5.10.181 (exc) |
| linux | linux_kernel | From 5.11 (inc) to 5.15.113 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 6.1.30 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.3.4 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel when built with CONFIG_PREEMPT_RCU=y. It involves a race condition between two CPUs accessing the rcu_node structure's exp_tasks field. CPU1 may set the exp_tasks pointer to NULL while holding a lock, but CPU2 accesses this field without holding the lock and may not see the update in time. As a result, CPU2 can dereference a NULL pointer, leading to a potential crash or undefined behavior. The fix involves ensuring that the lock is held while accessing the exp_tasks field to prevent this NULL-pointer dereference.
How can this vulnerability impact me? :
This vulnerability can cause a NULL-pointer dereference in the Linux kernel, which may lead to system crashes, instability, or denial of service. If exploited or triggered, it could disrupt normal system operations, potentially affecting availability and reliability of systems running affected kernel versions.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is resolved by applying a patch that holds the rcu_node structure's lock while accessing the exp_tasks field to prevent NULL-pointer dereference. Immediate mitigation involves updating the Linux kernel to a version that includes this fix, especially for kernels built with CONFIG_PREEMPT_RCU=y.