CVE-2023-53291Race Condition within a Thread in Linux

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 95.77%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 16

Description

In the Linux kernel, the following vulnerability has been resolved: rcu/rcuscale: Stop kfree_scale_thread thread(s) after unloading rcuscale Running the 'kfree_rcu_test' test case [1] results in a splat [2]. The root cause is the kfree_scale_thread thread(s) continue running after unloading the rcuscale module. This commit fixes that isue by invoking kfree_scale_cleanup() from rcu_scale_cleanup() when removing the rcuscale module. [1] modprobe rcuscale kfree_rcu_test=1 // After some time rmmo

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel5.65.10.188+4
Debianlinux/linux_kernel< 5.10.191-1+3
CVEListV5linux/linuxe6e78b004fa7e0ab455d46d27f218bf6ce178a18604d6a5ff718874904b0fe614878a42b42c0d699+6
debiandebian/linux< linux 6.1.52-1 (bookworm)

Patches

🔴Vulnerability Details

2
OSV
CVE-2023-53291: In the Linux kernel, the following vulnerability has been resolved: rcu/rcuscale: Stop kfree_scale_thread thread(s) after unloading rcuscale Running t2025-09-16
GHSA
GHSA-7472-5646-8g66: In the Linux kernel, the following vulnerability has been resolved: rcu/rcuscale: Stop kfree_scale_thread thread(s) after unloading rcuscale Running2025-09-16

📋Vendor Advisories

2
Red Hat
kernel: Linux kernel: Denial of Service due to improper thread termination in rcuscale module2025-09-16
Debian
CVE-2023-53291: linux - In the Linux kernel, the following vulnerability has been resolved: rcu/rcuscal...2023

💬Community

1
Bugzilla
CVE-2023-53291 kernel: Linux kernel: Denial of Service due to improper thread termination in rcuscale module2025-09-16
CVE-2023-53291 — Race Condition within a Thread | cvebase