CVE-2023-53593
BaseFortify
Publication date: 2025-10-04
Last updated on: 2026-03-21
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 5.17 |
| linux | linux_kernel | 5.17 |
| linux | linux_kernel | 5.17 |
| linux | linux_kernel | 5.17 |
| linux | linux_kernel | 5.17 |
| linux | linux_kernel | 5.17 |
| linux | linux_kernel | 5.17 |
| linux | linux_kernel | 6.5 |
| linux | linux_kernel | 6.5 |
| linux | linux_kernel | 6.5 |
| linux | linux_kernel | 6.5 |
| linux | linux_kernel | 6.5 |
| linux | linux_kernel | 6.5 |
| linux | linux_kernel | From 6.2 (inc) to 6.4.12 (exc) |
| linux | linux_kernel | From 5.17.1 (inc) to 6.1.47 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is in the Linux kernel's CIFS filesystem code. When using fscache, a cache hit during a read operation causes a page lock to be leaked because the code does not properly unlock the page after reading. This leads to a deadlock situation on subsequent reads to the same page, requiring a system reboot to resolve. The issue arises because the function cifs_readpage_worker does not release the folio lock as expected, unlike similar functions that do release it.
How can this vulnerability impact me? :
The vulnerability can cause a deadlock in the system when reading cached pages via CIFS with fscache enabled. This deadlock results from leaked page locks and can halt processes that try to access the affected pages, ultimately requiring a system reboot to recover. This can lead to system downtime and disruption of services relying on CIFS file access.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by observing a leaked page lock in the Linux kernel when using cifs with fscache. A symptom is a deadlock requiring a reboot. You can check the stack trace of a process experiencing the issue by running: cat /proc/<pid>/task/<tid>/stack and looking for the specific stack trace involving folio_wait_bit_common and filemap_read_folio as described. Replace <pid> and <tid> with the relevant process and thread IDs.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves rebooting the affected system to resolve the deadlock caused by the leaked page lock. Applying the patch or update that fixes the cifs_readpage_worker to properly release the folio lock after a read operation is necessary to prevent recurrence.