CVE-2023-53620 — Improper Locking in Linux
Severity
5.5MEDIUMNVD
EPSS
0.0%
top 99.00%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 7
Latest updateApr 20
Description
In the Linux kernel, the following vulnerability has been resolved:
md: fix soft lockup in status_resync
status_resync() will calculate 'curr_resync - recovery_active' to show
user a progress bar like following:
[============>........] resync = 61.4%
'curr_resync' and 'recovery_active' is updated in md_do_sync(), and
status_resync() can read them concurrently, hence it's possible that
'curr_resync - recovery_active' can overflow to a huge number. In this
case status_resync() will be stuck in…
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6
Affected Packages4 packages
▶CVEListV5linux/linux1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 — b4acb6c3ede88d6b7d33742a09e63cfce5e7fb69+3
Patches
🔴Vulnerability Details
3VulDB▶
Linux Kernel up to 6.1.29/6.3.3 status_resync denial of service (Nessus ID 276910 / WID-SEC-2025-2229)↗2026-04-20
GHSA▶
GHSA-gjrx-w6pw-88ph: In the Linux kernel, the following vulnerability has been resolved:
md: fix soft lockup in status_resync
status_resync() will calculate 'curr_resync↗2025-10-07
OSV▶
CVE-2023-53620: In the Linux kernel, the following vulnerability has been resolved: md: fix soft lockup in status_resync status_resync() will calculate 'curr_resync -↗2025-10-07