CVE-2023-53557
BaseFortify
Publication date: 2025-10-04
Last updated on: 2026-03-21
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.5 |
| linux | linux_kernel | From 6.2 (inc) to 6.4.5 (exc) |
| linux | linux_kernel | From 5.18 (inc) to 6.1.40 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel involves the fprobe feature where the release of a rethook is done incorrectly. Specifically, the rethook is released before ensuring that no users are still running it on other CPUs, which can cause a general protection fault due to accessing invalid memory addresses. The fix involves changing the order of operations to release the rethook only after unregistering the ftrace function, preventing this fault.
How can this vulnerability impact me? :
This vulnerability can cause a system crash or kernel fault (general protection fault) when running certain BPF selftests or using fprobe, potentially leading to system instability or denial of service.