CVE-2023-53671Linux vulnerability

5 documents5 sources
Severity
5.5MEDIUMNVD
EPSS
0.0%
top 98.22%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 7

Description

In the Linux kernel, the following vulnerability has been resolved: srcu: Delegate work to the boot cpu if using SRCU_SIZE_SMALL Commit 994f706872e6 ("srcu: Make Tree SRCU able to operate without snp_node array") assumes that cpu 0 is always online. However, there really are situations when some other CPU is the boot CPU, for example, when booting a kdump kernel with the maxcpus=1 boot parameter. On PowerPC, the kdump kernel can hang as follows: ... [ 1.740036] systemd[1]: Hostname set to [ 2

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel5.196.1.16+1
Debianlinux/linux_kernel< 6.1.20-1+2
CVEListV5linux/linux994f706872e6ce080506bd795ecf783d5b617de62c4d26dad76eadaa45a24543e311e9ce5d09f04e+3
debiandebian/linux< linux 6.1.20-1 (bookworm)

Patches

🔴Vulnerability Details

2
GHSA
GHSA-9qc3-f88f-6rgp: In the Linux kernel, the following vulnerability has been resolved: srcu: Delegate work to the boot cpu if using SRCU_SIZE_SMALL Commit 994f706872e62025-10-07
OSV
CVE-2023-53671: In the Linux kernel, the following vulnerability has been resolved: srcu: Delegate work to the boot cpu if using SRCU_SIZE_SMALL Commit 994f706872e6 (2025-10-07

📋Vendor Advisories

2
Red Hat
kernel: srcu: Delegate work to the boot cpu if using SRCU_SIZE_SMALL2025-10-07
Debian
CVE-2023-53671: linux - In the Linux kernel, the following vulnerability has been resolved: srcu: Deleg...2023