CVE-2023-53718Incorrect Synchronization in Linux

Severity
4.4MEDIUM
No vector
EPSS
0.0%
top 91.72%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 22

Description

In the Linux kernel, the following vulnerability has been resolved: ring-buffer: Do not swap cpu_buffer during resize process When ring_buffer_swap_cpu was called during resize process, the cpu buffer was swapped in the middle, resulting in incorrect state. Continuing to run in the wrong state will result in oops. This issue can be easily reproduced using the following two scripts: /tmp # cat test1.sh //#! /bin/sh for i in `seq 0 100000` do echo 2000 > /sys/kernel/debug/tracing/buffer_size_kb

Affected Packages4 packages

Linuxlinux/linux_kernel3.5.05.10.192+3
Debianlinux/linux_kernel< 5.10.197-1+3
CVEListV5linux/linux83f40318dab00e3298a1f6d0b12ac025e84e478d66a3b2a121386702663065d5c9e5a33c03d3f4a2+5
debiandebian/linux< linux 6.1.52-1 (bookworm)

🔴Vulnerability Details

3
OSV
ring-buffer: Do not swap cpu_buffer during resize process2025-10-22
GHSA
GHSA-gpg2-67wm-x4hf: In the Linux kernel, the following vulnerability has been resolved: ring-buffer: Do not swap cpu_buffer during resize process When ring_buffer_swap_2025-10-22
OSV
CVE-2023-53718: In the Linux kernel, the following vulnerability has been resolved: ring-buffer: Do not swap cpu_buffer during resize process When ring_buffer_swap_cp2025-10-22

📋Vendor Advisories

2
Red Hat
kernel: ring-buffer: Do not swap cpu_buffer during resize process2025-10-22
Debian
CVE-2023-53718: linux - In the Linux kernel, the following vulnerability has been resolved: ring-buffer...2023