Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

CVE-2023-53718

Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
22/10/2025
Última modificación:
22/10/2025

Descripción

*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ring-buffer: Do not swap cpu_buffer during resize process<br /> <br /> When ring_buffer_swap_cpu was called during resize process,<br /> the cpu buffer was swapped in the middle, resulting in incorrect state.<br /> Continuing to run in the wrong state will result in oops.<br /> <br /> This issue can be easily reproduced using the following two scripts:<br /> /tmp # cat test1.sh<br /> //#! /bin/sh<br /> for i in `seq 0 100000`<br /> do<br /> echo 2000 &gt; /sys/kernel/debug/tracing/buffer_size_kb<br /> sleep 0.5<br /> echo 5000 &gt; /sys/kernel/debug/tracing/buffer_size_kb<br /> sleep 0.5<br /> done<br /> /tmp # cat test2.sh<br /> //#! /bin/sh<br /> for i in `seq 0 100000`<br /> do<br /> echo irqsoff &gt; /sys/kernel/debug/tracing/current_tracer<br /> sleep 1<br /> echo nop &gt; /sys/kernel/debug/tracing/current_tracer<br /> sleep 1<br /> done<br /> /tmp # ./test1.sh &amp;<br /> /tmp # ./test2.sh &amp;<br /> <br /> A typical oops log is as follows, sometimes with other different oops logs.<br /> <br /> [ 231.711293] WARNING: CPU: 0 PID: 9 at kernel/trace/ring_buffer.c:2026 rb_update_pages+0x378/0x3f8<br /> [ 231.713375] Modules linked in:<br /> [ 231.714735] CPU: 0 PID: 9 Comm: kworker/0:1 Tainted: G W 6.5.0-rc1-00276-g20edcec23f92 #15<br /> [ 231.716750] Hardware name: linux,dummy-virt (DT)<br /> [ 231.718152] Workqueue: events update_pages_handler<br /> [ 231.719714] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)<br /> [ 231.721171] pc : rb_update_pages+0x378/0x3f8<br /> [ 231.722212] lr : rb_update_pages+0x25c/0x3f8<br /> [ 231.723248] sp : ffff800082b9bd50<br /> [ 231.724169] x29: ffff800082b9bd50 x28: ffff8000825f7000 x27: 0000000000000000<br /> [ 231.726102] x26: 0000000000000001 x25: fffffffffffff010 x24: 0000000000000ff0<br /> [ 231.728122] x23: ffff0000c3a0b600 x22: ffff0000c3a0b5c0 x21: fffffffffffffe0a<br /> [ 231.730203] x20: ffff0000c3a0b600 x19: ffff0000c0102400 x18: 0000000000000000<br /> [ 231.732329] x17: 0000000000000000 x16: 0000000000000000 x15: 0000ffffe7aa8510<br /> [ 231.734212] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000002<br /> [ 231.736291] x11: ffff8000826998a8 x10: ffff800082b9baf0 x9 : ffff800081137558<br /> [ 231.738195] x8 : fffffc00030e82c8 x7 : 0000000000000000 x6 : 0000000000000001<br /> [ 231.740192] x5 : ffff0000ffbafe00 x4 : 0000000000000000 x3 : 0000000000000000<br /> [ 231.742118] x2 : 00000000000006aa x1 : 0000000000000001 x0 : ffff0000c0007208<br /> [ 231.744196] Call trace:<br /> [ 231.744892] rb_update_pages+0x378/0x3f8<br /> [ 231.745893] update_pages_handler+0x1c/0x38<br /> [ 231.746893] process_one_work+0x1f0/0x468<br /> [ 231.747852] worker_thread+0x54/0x410<br /> [ 231.748737] kthread+0x124/0x138<br /> [ 231.749549] ret_from_fork+0x10/0x20<br /> [ 231.750434] ---[ end trace 0000000000000000 ]---<br /> [ 233.720486] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000<br /> [ 233.721696] Mem abort info:<br /> [ 233.721935] ESR = 0x0000000096000004<br /> [ 233.722283] EC = 0x25: DABT (current EL), IL = 32 bits<br /> [ 233.722596] SET = 0, FnV = 0<br /> [ 233.722805] EA = 0, S1PTW = 0<br /> [ 233.723026] FSC = 0x04: level 0 translation fault<br /> [ 233.723458] Data abort info:<br /> [ 233.723734] ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000<br /> [ 233.724176] CM = 0, WnR = 0, TnD = 0, TagAccess = 0<br /> [ 233.724589] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0<br /> [ 233.725075] user pgtable: 4k pages, 48-bit VAs, pgdp=0000000104943000<br /> [ 233.725592] [0000000000000000] pgd=0000000000000000, p4d=0000000000000000<br /> [ 233.726231] Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP<br /> [ 233.726720] Modules linked in:<br /> [ 233.727007] CPU: 0 PID: 9 Comm: kworker/0:1 Tainted: G W 6.5.0-rc1-00276-g20edcec23f92 #15<br /> [ 233.727777] Hardware name: linux,dummy-virt (DT)<br /> [ 233.728225] Workqueue: events update_pages_handler<br /> [ 233.728655] pstate: 200000c5 (nzCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)<br /> [ 233.729054] pc : rb_update_pages+0x1a8/0x3f8<br /> [ 233.729334] lr : rb_update_pages+0x154/0x3f8<br /> [ 233.729592] sp : ffff800082b9bd50<br /> [ 233.729792] x29: ffff800082b9bd50 x28: ffff8000825f7000 x27: 00000000<br /> ---truncated---

Impacto