CVE-2023-53478Race Condition in Linux

CWE-362Race Condition5 documents5 sources
Severity
4.7MEDIUMNVD
EPSS
0.0%
top 99.00%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 1

Description

In the Linux kernel, the following vulnerability has been resolved: tracing/synthetic: Fix races on freeing last_cmd Currently, the "last_cmd" variable can be accessed by multiple processes asynchronously when multiple users manipulate synthetic_events node at the same time, it could lead to use-after-free or double-free. This patch add "lastcmd_mutex" to prevent "last_cmd" from being accessed asynchronously. It's easy to reproduce in the KASAN environment by running the two scripts below i

CVSS vector

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.0 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel5.186.1.24+2
Debianlinux/linux_kernel< 6.1.25-1+2
CVEListV5linux/linux27c888da9867725784bad3d6455d6e53b425fa2b9fe183f659a2704255e5d84f6ae308c234a113ec+3
debiandebian/linux< linux 6.1.25-1 (bookworm)

Patches

🔴Vulnerability Details

2
OSV
CVE-2023-53478: In the Linux kernel, the following vulnerability has been resolved: tracing/synthetic: Fix races on freeing last_cmd Currently, the "last_cmd" variabl2025-10-01
GHSA
GHSA-q32w-2qjp-8m8q: In the Linux kernel, the following vulnerability has been resolved: tracing/synthetic: Fix races on freeing last_cmd Currently, the "last_cmd" varia2025-10-01

📋Vendor Advisories

2
Red Hat
kernel: tracing/synthetic: Fix races on freeing last_cmd2025-10-01
Debian
CVE-2023-53478: linux - In the Linux kernel, the following vulnerability has been resolved: tracing/syn...2023