CVE-2023-53668
BaseFortify
Publication date: 2025-10-07
Last updated on: 2026-02-26
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.5 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-125 | The product reads data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a deadloop (infinite loop) issue in the Linux kernel's ring-buffer subsystem when reading the 'trace_pipe' file. The problem occurs because the ring buffer's pages are not fully cleared during a reset, causing the system to incorrectly detect that there is data to read when there isn't. This leads to a soft lockup where the CPU gets stuck in a loop trying to read data that never arrives, effectively causing the system to hang during this operation.
How can this vulnerability impact me? :
The vulnerability can cause a soft lockup in the Linux kernel when reading the 'trace_pipe' file, which means the CPU can become stuck for an extended period (e.g., 22 seconds or more). This can lead to system instability, degraded performance, or unresponsiveness during tracing operations, potentially impacting system reliability and availability.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by observing a soft lockup occurring when reading the file 'trace_pipe'. Specifically, the system may log messages similar to: 'watchdog: BUG: soft lockup - CPU#X stuck for Ys! [cat:PID]' along with kernel call traces involving ring_buffer_empty_cpu and tracing_read_pipe. To detect this, you can try reading from /sys/kernel/debug/tracing/trace_pipe using a command like 'cat /sys/kernel/debug/tracing/trace_pipe' and monitor for system hangs or soft lockup messages in the kernel logs (e.g., using 'dmesg' or 'journalctl -k').
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version where this ring-buffer deadloop issue on reading trace_pipe has been fixed. The fix clears every page in rb_reset_cpu() to prevent the deadloop caused by dirty entries in the ring buffer. Until an update is applied, avoid reading from 'trace_pipe' to prevent triggering the soft lockup.