CVE-2023-53557Race Condition within a Thread in Linux

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 98.22%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 4

Description

In the Linux kernel, the following vulnerability has been resolved: fprobe: Release rethook after the ftrace_ops is unregistered While running bpf selftests it's possible to get following fault: general protection fault, probably for non-canonical address \ 0x6b6b6b6b6b6b6b6b: 0000 [#1] PREEMPT SMP DEBUG_PAGEALLOC NOPTI ... Call Trace: fprobe_handler+0xc1/0x270 ? __pfx_bpf_testmod_init+0x10/0x10 ? __pfx_bpf_testmod_init+0x10/0x10 ? bpf_fentry_test1+0x5/0x10 ? bpf_fentry_test1+0x5/0x10 ? bpf_

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel5.186.1.40+2
Debianlinux/linux_kernel< 6.1.52-1+2
CVEListV5linux/linux5b0ab78998e32564a011b14c4c7f9c81e2d42b9dce3ec57faff559ccae1e0150c1f077eb2df648a4+3
debiandebian/linux< linux 6.1.52-1 (bookworm)

Patches

🔴Vulnerability Details

2
GHSA
GHSA-4jf8-pxjc-f722: In the Linux kernel, the following vulnerability has been resolved: fprobe: Release rethook after the ftrace_ops is unregistered While running bpf s2025-10-04
OSV
CVE-2023-53557: In the Linux kernel, the following vulnerability has been resolved: fprobe: Release rethook after the ftrace_ops is unregistered While running bpf sel2025-10-04

📋Vendor Advisories

2
Red Hat
kernel: fprobe: Release rethook after the ftrace_ops is unregistered2025-10-04
Debian
CVE-2023-53557: linux - In the Linux kernel, the following vulnerability has been resolved: fprobe: Rel...2023