CVE-2023-53216Incorrect Synchronization in Linux

Severity
7.8HIGHNVD
EPSS
0.0%
top 95.67%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 15

Description

In the Linux kernel, the following vulnerability has been resolved: arm64: efi: Make efi_rt_lock a raw_spinlock Running a rt-kernel base on 6.2.0-rc3-rt1 on an Ampere Altra outputs the following: BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:46 in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 9, name: kworker/u320:0 preempt_count: 2, expected: 0 RCU nest depth: 0, expected: 0 3 locks held by kworker/u320:0/9: #0: ffff3fff8c27d128 ((wq_completion)efi_r

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages4 packages

NVDlinux/linux_kernel5.10.1655.10.175+3
Debianlinux/linux_kernel< 5.10.178-1+3
CVEListV5linux/linux4012603cbd469223f225637d265a233f034c567a030b1c4217a4f504c7d0795a2bd86b7181e56f11+5
debiandebian/linux< linux 6.1.20-1 (bookworm)

Patches

🔴Vulnerability Details

2
OSV
CVE-2023-53216: In the Linux kernel, the following vulnerability has been resolved: arm64: efi: Make efi_rt_lock a raw_spinlock Running a rt-kernel base on 62025-09-15
GHSA
GHSA-q98w-vcm8-j2qw: In the Linux kernel, the following vulnerability has been resolved: arm64: efi: Make efi_rt_lock a raw_spinlock Running a rt-kernel base on 62025-09-15

📋Vendor Advisories

2
Red Hat
kernel: arm64: efi: Make efi_rt_lock a raw_spinlock2025-09-15
Debian
CVE-2023-53216: linux - In the Linux kernel, the following vulnerability has been resolved: arm64: efi:...2023
CVE-2023-53216 — Incorrect Synchronization in Linux | cvebase