vulnerability
Ubuntu: (CVE-2023-53712): linux vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:L/AC:L/Au:S/C:N/I:N/A:C) | Oct 24, 2025 | Oct 28, 2025 | Dec 2, 2025 |
Description
In the Linux kernel, the following vulnerability has been resolved: ARM: 9317/1: kexec: Make smp stop calls asynchronous If a panic is triggered by a hrtimer interrupt all online cpus will be notified and set offline. But as highlighted by commit 19dbdcb8039c ("smp: Warn on function calls from softirq context") this call should not be made synchronous with disabled interrupts: softdog: Initiating panic Kernel panic - not syncing: Software Watchdog Timer expired WARNING: CPU: 1 PID: 0 at kernel/smp.c:753 smp_call_function_many_cond unwind_backtrace: show_stack dump_stack_lvl __warn warn_slowpath_fmt smp_call_function_many_cond smp_call_function crash_smp_send_stop.part.0 machine_crash_shutdown __crash_kexec panic softdog_fire __hrtimer_run_queues hrtimer_interrupt Make the smp call for machine_crash_nonpanic_core() asynchronous.
Solutions
References
- CVE-2023-53712
- https://attackerkb.com/topics/CVE-2023-53712
- URL-https://git.kernel.org/linus/8922ba71c969d2a0c01a94372a71477d879470de
- URL-https://git.kernel.org/stable/c/46870eea5496ff277e86187a49ac5a667cfe60c4
- URL-https://git.kernel.org/stable/c/5590ba4560eefbd19a4ed07c7e7c8e4c51ffc628
- URL-https://git.kernel.org/stable/c/8922ba71c969d2a0c01a94372a71477d879470de
- URL-https://git.kernel.org/stable/c/ee378f45a70d09b51373ba495d30d99ef12219c1
- URL-https://www.cve.org/CVERecord?id=CVE-2023-53712
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.