CVE-2023-53461
BaseFortify
Publication date: 2025-10-01
Last updated on: 2025-10-02
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's io_uring feature during its exit process. When io_uring exits, it performs cleanup and waits for request completions using a function called io_ring_exit_work, which runs in a kernel worker thread (kworker) that does not handle signals. Because of this, waiting for completions in an uninterruptible state can cause problems with the hung task detection system, especially if the owning task is stopped (e.g., by SIGSTOP) and cannot run the necessary work to complete requests. This situation can falsely trigger hung task detection and potentially cause a kernel panic if panic-on-hung-task is enabled. The fix was to change the wait state to interruptible, which avoids these issues without losing any important warnings.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to falsely detect that a task is hung during the io_uring exit process, especially if the owning task is stopped and cannot complete its work. This false detection can trigger a kernel panic if the system is configured to panic on hung tasks, leading to system crashes and potential downtime.