CVE-2023-53620Improper Locking in Linux

CWE-667Improper Locking6 documents6 sources
Severity
5.5MEDIUMNVD
EPSS
0.0%
top 99.00%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 7
Latest updateApr 20

Description

In the Linux kernel, the following vulnerability has been resolved: md: fix soft lockup in status_resync status_resync() will calculate 'curr_resync - recovery_active' to show user a progress bar like following: [============>........] resync = 61.4% 'curr_resync' and 'recovery_active' is updated in md_do_sync(), and status_resync() can read them concurrently, hence it's possible that 'curr_resync - recovery_active' can overflow to a huge number. In this case status_resync() will be stuck in

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel2.6.12.16.1.30+2
Debianlinux/linux_kernel< 6.1.37-1+2
CVEListV5linux/linux1da177e4c3f41524e886b7f1b8a0c1fc7321cac2b4acb6c3ede88d6b7d33742a09e63cfce5e7fb69+3
debiandebian/linux< linux 6.1.37-1 (bookworm)

Patches

🔴Vulnerability Details

3
VulDB
Linux Kernel up to 6.1.29/6.3.3 status_resync denial of service (Nessus ID 276910 / WID-SEC-2025-2229)2026-04-20
GHSA
GHSA-gjrx-w6pw-88ph: In the Linux kernel, the following vulnerability has been resolved: md: fix soft lockup in status_resync status_resync() will calculate 'curr_resync2025-10-07
OSV
CVE-2023-53620: In the Linux kernel, the following vulnerability has been resolved: md: fix soft lockup in status_resync status_resync() will calculate 'curr_resync -2025-10-07

📋Vendor Advisories

2
Red Hat
kernel: md: fix soft lockup in status_resync2025-10-07
Debian
CVE-2023-53620: linux - In the Linux kernel, the following vulnerability has been resolved: md: fix sof...2023