CVE-2023-53621
BaseFortify
Publication date: 2025-10-07
Last updated on: 2026-02-05
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel involves the memory control group (memcg) subsystem. When checking eviction recency, the system tries to retrieve the memcg associated with a memory folio by using a stored memcg ID. However, there is a rare chance that the retrieved memcg is not the original one but a new memcg with the same ID. If this new memcg is accessed before it is properly attached to the memcg hierarchy, it can cause a NULL pointer dereference, leading to a kernel crash (NULL pointer exception) during memcg hierarchy traversal.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash due to a NULL pointer dereference, resulting in system instability or downtime. Such crashes can disrupt services running on the affected system, potentially leading to data loss or degraded system availability.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring the system logs for kernel NULL pointer dereference errors related to mem_cgroup_get_nr_swap_pages, which may appear as kernel oops messages similar to the provided stack trace. You can check the kernel logs using commands like 'dmesg | grep -i mem_cgroup_get_nr_swap_pages' or 'journalctl -k | grep -i mem_cgroup_get_nr_swap_pages' to identify occurrences of this issue.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include updating the Linux kernel to a version where this vulnerability is fixed, as the issue is resolved by a patch that ensures proper setup of memcg acquired by id. Until the update is applied, monitoring for kernel crashes and avoiding workloads that heavily use memory control groups may reduce the risk of triggering the bug.