CVE-2023-53558Use of Blocking Code in Single-threaded, Non-blocking Context in Linux

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 98.22%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 4

Description

In the Linux kernel, the following vulnerability has been resolved: rcu-tasks: Avoid pr_info() with spin lock in cblist_init_generic() pr_info() is called with rtp->cbs_gbl_lock spin lock locked. Because pr_info() calls printk() that might sleep, this will result in BUG like below: [ 0.206455] cblist_init_generic: Setting adjustable number of callback queues. [ 0.206463] [ 0.206464] ============================= [ 0.206464] [ BUG: Invalid wait context ] [ 0.206465] 5.19.0-00428-g9de1f9c8ca51

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel5.176.1.42+1
Debianlinux/linux_kernel< 6.1.52-1+2
CVEListV5linux/linuxab97152f88a4d580b89f0b7cc3028ffac438216f9027d69221ff96e1356f070f7feb2ff989ae7388+3
debiandebian/linux< linux 6.1.52-1 (bookworm)

Patches

🔴Vulnerability Details

2
GHSA
GHSA-449w-38pp-j3qp: In the Linux kernel, the following vulnerability has been resolved: rcu-tasks: Avoid pr_info() with spin lock in cblist_init_generic() pr_info() is2025-10-04
OSV
CVE-2023-53558: In the Linux kernel, the following vulnerability has been resolved: rcu-tasks: Avoid pr_info() with spin lock in cblist_init_generic() pr_info() is ca2025-10-04

📋Vendor Advisories

2
Red Hat
kernel: rcu-tasks: Avoid pr_info() with spin lock in cblist_init_generic()2025-10-04
Debian
CVE-2023-53558: linux - In the Linux kernel, the following vulnerability has been resolved: rcu-tasks: ...2023