CVE-2023-53815
BaseFortify
Publication date: 2025-12-09
Last updated on: 2025-12-09
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's posix-timers, specifically in the itimer_delete() function. When a timer is concurrently expired, itimer_delete() uses a retry loop. On non-RT kernels, this results in spin-waiting until the timer callback completes. However, for posix CPU timers with HAVE_POSIX_CPU_TIMERS_TASK_WORK enabled and on RT kernels, the existing task could enter a live lock by preempting the task handling the timer delivery. The fix replaces spin_unlock() with timer_wait_running() to prevent this live lock, aligning the behavior with other retry loops in the posix timer code.
How can this vulnerability impact me? :
This vulnerability can cause a real-time (RT) live lock in the Linux kernel when using posix CPU timers with HAVE_POSIX_CPU_TIMERS_TASK_WORK enabled. A live lock means that the affected task continuously preempts the timer delivery task, preventing progress and potentially causing system responsiveness issues or degraded performance in time-sensitive applications.