-
CVE-2023-53614
- EPSS 0.02%
- Veröffentlicht 04.10.2025 15:44:21
- Zuletzt bearbeitet 06.10.2025 14:56:21
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: mm/ksm: fix race with VMA iteration and mm_struct teardown exit_mmap() will tear down the VMAs and maple tree with the mmap_lock held in write mode. Ensure that the maple tree is still valid by checking ksm_test_exit() after taking the mmap_lock in read mode, but before the for_each_vma() iterator dereferences a destroyed maple tree. Since the maple tree is destroyed, the flags telling lockdep to check an external lock has been cleared. Skip the for_each_vma() iterator to avoid dereferencing a maple tree without the external lock flag, which would create a lockdep warning.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
286b0cab31bac29960e5684f6fb331d42f03b363
Version
a5f18ba0727656bd1fe3bcdb0d563f81790f9a04
Status
affected
Version <
b4f664ffd8f78c05a1fd542a28bc5a11e994c014
Version
a5f18ba0727656bd1fe3bcdb0d563f81790f9a04
Status
affected
Version <
6db504ce55bdbc575723938fc480713c9183f6a2
Version
a5f18ba0727656bd1fe3bcdb0d563f81790f9a04
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
6.1
Status
affected
Version <
6.1
Version
0
Status
unaffected
Version <=
6.1.*
Version
6.1.22
Status
unaffected
Version <=
6.2.*
Version
6.2.9
Status
unaffected
Version <=
*
Version
6.3
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.02% | 0.028 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|