CVE-2023-53866
BaseFortify
Publication date: 2025-12-09
Last updated on: 2025-12-09
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's ASoC soc-compress component occurs because the pcm_mutex lock is not properly held when starting a compress stream (DPCM). If the kernel is configured with panic_on_warn set, this improper locking leads to a kernel panic. The issue arises in several functions that call snd_soc_dpcm_mutex_assert_held without holding the pcm_mutex, causing warnings and ultimately a panic when the compress stream is started. The fix involved repositioning and adding pcm_mutex locking to prevent this panic.
How can this vulnerability impact me? :
If this vulnerability is triggered, it can cause the Linux kernel to panic and stop functioning, leading to a system crash. This can result in downtime, loss of data, and disruption of services on systems using the affected kernel component when compress streams are started with panic_on_warn enabled.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring the system kernel logs for warnings related to snd_soc_dpcm_mutex_assert_held and kernel panics triggered when panic_on_warn is set. Specifically, look for log entries showing call traces involving soc_compr_open_fe, dpcm_process_paths, and related functions. Commands such as 'dmesg | grep snd_soc_dpcm_mutex_assert_held' or 'journalctl -k | grep panic_on_warn' can help identify these issues.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability immediately, update the Linux kernel to a version where the pcm_mutex locking has been properly added and repositioned in the soc-compress component, as described in the fix. If updating is not immediately possible, consider disabling panic_on_warn to prevent kernel panic on warnings related to this issue, though this is a temporary measure and not a full fix.