CVE-2023-53614Race Condition in Linux

CWE-362Race Condition5 documents5 sources
Severity
4.7MEDIUMNVD
EPSS
0.0%
top 99.00%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 4

Description

In the Linux kernel, the following vulnerability has been resolved: mm/ksm: fix race with VMA iteration and mm_struct teardown exit_mmap() will tear down the VMAs and maple tree with the mmap_lock held in write mode. Ensure that the maple tree is still valid by checking ksm_test_exit() after taking the mmap_lock in read mode, but before the for_each_vma() iterator dereferences a destroyed maple tree. Since the maple tree is destroyed, the flags telling lockdep to check an external lock has be

CVSS vector

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.0 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel6.16.1.22+2
Debianlinux/linux_kernel< 6.1.25-1+2
CVEListV5linux/linuxa5f18ba0727656bd1fe3bcdb0d563f81790f9a04286b0cab31bac29960e5684f6fb331d42f03b363+3
debiandebian/linux< linux 6.1.25-1 (bookworm)

Patches

🔴Vulnerability Details

2
GHSA
GHSA-m8wv-9hr6-j68w: In the Linux kernel, the following vulnerability has been resolved: mm/ksm: fix race with VMA iteration and mm_struct teardown exit_mmap() will tear2025-10-04
OSV
CVE-2023-53614: In the Linux kernel, the following vulnerability has been resolved: mm/ksm: fix race with VMA iteration and mm_struct teardown exit_mmap() will tear d2025-10-04

📋Vendor Advisories

2
Red Hat
kernel: mm/ksm: fix race with VMA iteration and mm_struct teardown2025-10-04
Debian
CVE-2023-53614: linux - In the Linux kernel, the following vulnerability has been resolved: mm/ksm: fix...2023