CVE-2023-53671
BaseFortify
Publication date: 2025-10-07
Last updated on: 2026-02-26
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 6.2 (inc) to 6.2.3 (inc) |
| linux | linux_kernel | 6.1.0-rc1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel involves an assumption in the srcu subsystem that CPU 0 is always the boot CPU. However, in some cases, such as when booting a kdump kernel with the maxcpus=1 parameter, a different CPU may be the boot CPU. This incorrect assumption can cause the system to hang, particularly on PowerPC architectures, due to work being delegated incorrectly to CPU 0 when it may not be online.
How can this vulnerability impact me? :
The vulnerability can cause the system to hang or become unresponsive, especially on PowerPC systems running a kdump kernel with specific boot parameters. This can lead to system instability and potential downtime, affecting availability and reliability of the affected systems.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by observing system logs for symptoms such as the system hanging or tasks being blocked for extended periods, especially on PowerPC architectures. Look for kernel messages indicating tasks blocked for more than 122 seconds, hung task warnings, or call traces related to systemd or kworker processes. Commands to check include: 'dmesg | grep -i hung_task', 'journalctl -k | grep -i blocked', and monitoring for system hangs or kernel panic messages.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version where this vulnerability is resolved, as the issue stems from incorrect assumptions about the boot CPU in the srcu code. Until an update is applied, a temporary workaround might include disabling hung task warnings by running 'echo 0 > /proc/sys/kernel/hung_task_timeout_secs' to prevent system hangs from causing blocking, but this does not fix the root cause. The recommended step is to apply the patch or upgrade the kernel to a fixed version.