CVE-2023-53587
BaseFortify
Publication date: 2025-10-04
Last updated on: 2026-03-23
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 6.3 (inc) to 6.3.2 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.2.15 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 6.1.28 (exc) |
| linux | linux_kernel | From 5.11 (inc) to 5.15.111 (exc) |
| linux | linux_kernel | From 5.5 (inc) to 5.10.180 (exc) |
| linux | linux_kernel | From 4.20 (inc) to 5.4.243 (exc) |
| linux | linux_kernel | From 4.15 (inc) to 4.19.283 (exc) |
| linux | linux_kernel | From 3.10 (inc) to 4.14.315 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-416 | The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's ring-buffer occurs because the synchronization of IRQ (interrupt request) work is done before the buffer is destroyed. If data is written to the buffer just before its destruction, it may be possible for the buffer to be destroyed before the IRQ work completes. This can lead to a use-after-free error, where the system tries to access memory that has already been freed, potentially causing crashes or memory corruption.
How can this vulnerability impact me? :
The impact of this vulnerability includes potential kernel crashes or instability due to use-after-free errors. This can affect system reliability and may lead to denial of service or unpredictable behavior in systems running vulnerable Linux kernel versions.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by observing kernel crash reports or KASAN (Kernel Address Sanitizer) reports indicating a slab-use-after-free in irq_work_run_list. Specifically, look for BUG messages similar to: 'BUG: KASAN: slab-use-after-free in irq_work_run_list+0x11a/0x13a'. To detect such issues, enable KASAN in your kernel configuration and monitor dmesg or kernel logs for these reports. There are no specific network commands to detect this vulnerability as it is related to kernel internal buffer handling.
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation is to update the Linux kernel to a version that includes the fix for this vulnerability, which adds the appropriate irq_work_sync() call to ensure IRQ work finishes before buffer destruction. Until then, enabling KASAN can help detect occurrences of this issue during testing. There are no other specific mitigation steps mentioned.