CVE-2023-53728
BaseFortify
Publication date: 2025-10-22
Last updated on: 2025-10-22
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's posix-timers involves a race condition in the timer ID allocation loop. The function posix_timer_add() tries to allocate a timer ID by starting from a cached ID stored from the last successful allocation. The search for a free ID slot is done in a loop that should terminate when the search wraps around to the starting point. However, the starting point is read without locking, which can lead to a negative start value being observed due to concurrent updates by multiple CPUs. This causes the loop termination condition to never be met, potentially resulting in an endless loop. The issue was fixed by ensuring all ID operations occur under a lock to prevent this race condition.
How can this vulnerability impact me? :
This vulnerability can cause the posix_timer_add() function to enter an endless loop due to a race condition in timer ID allocation. While the likelihood is low because the ID space is very large, if triggered, it could lead to a denial of service or system hang as the kernel function fails to complete properly.
What immediate steps should I take to mitigate this vulnerability?
Apply the patch or update the Linux kernel to a version where the posix-timers implementation ensures that all timer ID operations are performed under the hash lock, thereby fixing the race condition described. This prevents the potential endless loop caused by a racy read of the start value in posix_timer_add().