CVE-2023-53718 — Incorrect Synchronization in Linux
Severity
4.4MEDIUM
No vectorEPSS
0.0%
top 91.72%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 22
Description
In the Linux kernel, the following vulnerability has been resolved:
ring-buffer: Do not swap cpu_buffer during resize process
When ring_buffer_swap_cpu was called during resize process,
the cpu buffer was swapped in the middle, resulting in incorrect state.
Continuing to run in the wrong state will result in oops.
This issue can be easily reproduced using the following two scripts:
/tmp # cat test1.sh
//#! /bin/sh
for i in `seq 0 100000`
do
echo 2000 > /sys/kernel/debug/tracing/buffer_size_kb…
Affected Packages4 packages
▶CVEListV5linux/linux83f40318dab00e3298a1f6d0b12ac025e84e478d — 66a3b2a121386702663065d5c9e5a33c03d3f4a2+5
🔴Vulnerability Details
3GHSA▶
GHSA-gpg2-67wm-x4hf: In the Linux kernel, the following vulnerability has been resolved:
ring-buffer: Do not swap cpu_buffer during resize process
When ring_buffer_swap_↗2025-10-22
OSV▶
CVE-2023-53718: In the Linux kernel, the following vulnerability has been resolved: ring-buffer: Do not swap cpu_buffer during resize process When ring_buffer_swap_cp↗2025-10-22