CVE-2023-53419NULL Pointer Dereference in Linux

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 93.12%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 18

Description

In the Linux kernel, the following vulnerability has been resolved: rcu: Protect rcu_print_task_exp_stall() ->exp_tasks access For kernels built with CONFIG_PREEMPT_RCU=y, the following scenario can result in a NULL-pointer dereference: CPU1 CPU2 rcu_preempt_deferred_qs_irqrestore rcu_print_task_exp_stall if (special.b.blocked) READ_ONCE(rnp->exp_tasks) != NULL raw_spin_lock_rcu_node np = rcu_next_node_entry(t, rnp) if (&t->rcu_node_entry == rnp->exp_tasks) WRITE_ONCE(rnp->exp_tasks, np) ....

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel5.115.15.113+3
Debianlinux/linux_kernel< 5.10.191-1+3
CVEListV5linux/linux314eeb43e5f22856b281c91c966e51e5782a3498a7d21b8585894e6fff973f6ddae42f02b13f600f+5
debiandebian/linux< linux 6.1.37-1 (bookworm)

Patches

🔴Vulnerability Details

2
GHSA
GHSA-w2v8-x9hv-74wh: In the Linux kernel, the following vulnerability has been resolved: rcu: Protect rcu_print_task_exp_stall() ->exp_tasks access For kernels built wit2025-09-18
OSV
CVE-2023-53419: In the Linux kernel, the following vulnerability has been resolved: rcu: Protect rcu_print_task_exp_stall() ->exp_tasks access For kernels built with2025-09-18

📋Vendor Advisories

2
Red Hat
kernel: rcu: Protect rcu_print_task_exp_stall() ->exp_tasks access2025-09-18
Debian
CVE-2023-53419: linux - In the Linux kernel, the following vulnerability has been resolved: rcu: Protec...2023
CVE-2023-53419 — NULL Pointer Dereference in Linux | cvebase