CVE-2023-53765
BaseFortify
Publication date: 2025-12-08
Last updated on: 2025-12-08
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.0.0-rc2 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's dm-cache component involves improper cleanup of background tracker work objects. Specifically, the kernel fails to free queued work in the background tracker during destruction, which can cause the kernel to BUG (crash) due to objects remaining in the work queue when the slab cache is shut down.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash (BUG) when the dm-cache background tracker does not properly free its queued work objects. Such crashes can lead to system instability, potential downtime, and data loss depending on the environment where the kernel is running.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring the kernel logs for specific BUG messages related to dm_cache and background tracker work objects. Look for log entries similar to: '[ 2245.426978] BUG bt_work (Tainted: G B W ): Objects remaining in bt_work on __kmem_cache_shutdown()' or warnings about 'kmem_cache_destroy bt_work: Slab cache still has objects when called from btracker_destroy'. You can use the command 'dmesg | grep -i dm_cache' or 'journalctl -k | grep -i dm_cache' to check for these messages in the kernel logs.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version where this vulnerability is resolved, as the issue is fixed by freeing the background tracker's queued work in btracker_destroy. Until an update is applied, monitoring for the described kernel BUG messages and avoiding workloads that trigger dm_cache background tracker destruction may reduce risk.