CVE-2023-53368 — Race Condition in Linux
Severity
4.7MEDIUMNVD
EPSS
0.0%
top 97.79%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedSep 17
Description
In the Linux kernel, the following vulnerability has been resolved:
tracing: Fix race issue between cpu buffer write and swap
Warning happened in rb_end_commit() at code:
if (RB_WARN_ON(cpu_buffer, !local_read(&cpu_buffer->committing)))
WARNING: CPU: 0 PID: 139 at kernel/trace/ring_buffer.c:3142
rb_commit+0x402/0x4a0
Call Trace:
ring_buffer_unlock_commit+0x42/0x250
trace_buffer_unlock_commit_regs+0x3b/0x250
trace_event_buffer_commit+0xe5/0x440
trace_event_buffer_reserve+0x11c/0x150
trace_even…
CVSS vector
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.0 | Impact: 3.6
Affected Packages4 packages
▶CVEListV5linux/linuxf1affcaaa861f27752a769f889bf1486ebd301fe — 90e037cabc2c2dfc39b3dd9c5b22ea91f995539a+7
Patches
🔴Vulnerability Details
2OSV▶
CVE-2023-53368: In the Linux kernel, the following vulnerability has been resolved: tracing: Fix race issue between cpu buffer write and swap Warning happened in rb_e↗2025-09-17
GHSA▶
GHSA-mrjw-9wmf-9mph: In the Linux kernel, the following vulnerability has been resolved:
tracing: Fix race issue between cpu buffer write and swap
Warning happened in rb↗2025-09-17