CVE-2023-53522
BaseFortify
Publication date: 2025-10-01
Last updated on: 2026-04-06
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves a circular locking dependency in the Linux kernel between two locks: cpu_hotplug_lock and freezer_mutex. The issue arose after a code change replaced atomic_inc() with static_branch_inc() in freezer_apply_state(), which holds cpu_hotplug_lock. The locking order was inconsistent, causing a potential deadlock scenario where cpu_hotplug_lock waits for freezer_mutex and freezer_mutex waits for cpu_hotplug_lock. The fix was to swap the locking order by moving cpus_read_lock() in freezer_apply_state() to occur before acquiring freezer_mutex in freezer_change_state(), preventing the circular dependency.
How can this vulnerability impact me? :
This vulnerability can lead to a deadlock situation in the Linux kernel's cgroup freezer subsystem, potentially causing system hangs or freezes when managing CPU hotplugging and process freezing. This can degrade system stability and availability, impacting any applications or services running on the affected system.