CVE-2023-53291 — Race Condition within a Thread in Linux
Severity
5.5MEDIUMNVD
EPSS
0.0%
top 95.77%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedSep 16
Description
In the Linux kernel, the following vulnerability has been resolved:
rcu/rcuscale: Stop kfree_scale_thread thread(s) after unloading rcuscale
Running the 'kfree_rcu_test' test case [1] results in a splat [2].
The root cause is the kfree_scale_thread thread(s) continue running
after unloading the rcuscale module. This commit fixes that isue by
invoking kfree_scale_cleanup() from rcu_scale_cleanup() when removing
the rcuscale module.
[1] modprobe rcuscale kfree_rcu_test=1
// After some time
rmmo…
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6
Affected Packages4 packages
▶CVEListV5linux/linuxe6e78b004fa7e0ab455d46d27f218bf6ce178a18 — 604d6a5ff718874904b0fe614878a42b42c0d699+6
Patches
🔴Vulnerability Details
2OSV▶
CVE-2023-53291: In the Linux kernel, the following vulnerability has been resolved: rcu/rcuscale: Stop kfree_scale_thread thread(s) after unloading rcuscale Running t↗2025-09-16
GHSA▶
GHSA-7472-5646-8g66: In the Linux kernel, the following vulnerability has been resolved:
rcu/rcuscale: Stop kfree_scale_thread thread(s) after unloading rcuscale
Running↗2025-09-16
📋Vendor Advisories
2💬Community
1Bugzilla▶
CVE-2023-53291 kernel: Linux kernel: Denial of Service due to improper thread termination in rcuscale module↗2025-09-16