CVE-2023-53519Improper Locking in Linux

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 97.78%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 1

Description

In the Linux kernel, the following vulnerability has been resolved: media: v4l2-mem2mem: add lock to protect parameter num_rdy Getting below error when using KCSAN to check the driver. Adding lock to protect parameter num_rdy when getting the value with function: v4l2_m2m_num_src_bufs_ready/v4l2_m2m_num_dst_bufs_ready. kworker/u16:3: [name:report&]BUG: KCSAN: data-race in v4l2_m2m_buf_queue kworker/u16:3: [name:report&] kworker/u16:3: [name:report&]read-write to 0xffffff8105f35b94 of 1 bytes

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel2.6.394.14.324+6
Debianlinux/linux_kernel< 5.10.197-1+3
CVEListV5linux/linux908a0d7c588ef87e5cf0a26805e6002a78ac9d13690dd4780b3f4d755e4e7883e8c3d1b5052f6bf2+8
debiandebian/linux< linux 6.1.52-1 (bookworm)

Patches

🔴Vulnerability Details

2
GHSA
GHSA-g4hw-wv9w-w499: In the Linux kernel, the following vulnerability has been resolved: media: v4l2-mem2mem: add lock to protect parameter num_rdy Getting below error w2025-10-01
OSV
CVE-2023-53519: In the Linux kernel, the following vulnerability has been resolved: media: v4l2-mem2mem: add lock to protect parameter num_rdy Getting below error whe2025-10-01

📋Vendor Advisories

2
Red Hat
kernel: media: v4l2-mem2mem: add lock to protect parameter num_rdy2025-10-01
Debian
CVE-2023-53519: linux - In the Linux kernel, the following vulnerability has been resolved: media: v4l2...2023
CVE-2023-53519 — Improper Locking in Linux | cvebase