{
  "threat_severity" : "Low",
  "public_date" : "2025-09-18T00:00:00Z",
  "bugzilla" : {
    "description" : "kernel: Linux kernel: Denial of Service in UFS subsystem",
    "id" : "2396407",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2396407"
  },
  "cvss3" : {
    "cvss3_base_score" : "5.5",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-825",
  "details" : [ "In the Linux kernel, the following vulnerability has been resolved:\nscsi: ufs: core: Fix device management cmd timeout flow\nIn the UFS error handling flow, the host will send a device management cmd\n(NOP OUT) to the device for link recovery. If this cmd times out and\nclearing the doorbell fails, ufshcd_wait_for_dev_cmd() will do nothing and\nreturn. hba->dev_cmd.complete struct is not set to NULL.\nWhen this happens, if cmd has been completed by device, then we will call\ncomplete() in __ufshcd_transfer_req_compl(). Because the complete struct is\nallocated on the stack, the following crash will occur:\nipanic_die+0x24/0x38 [mrdump]\ndie+0x344/0x748\narm64_notify_die+0x44/0x104\ndo_debug_exception+0x104/0x1e0\nel1_dbg+0x38/0x54\nel1_sync_handler+0x40/0x88\nel1_sync+0x8c/0x140\nqueued_spin_lock_slowpath+0x2e4/0x3c0\n__ufshcd_transfer_req_compl+0x3b0/0x1164\nufshcd_trc_handler+0x15c/0x308\nufshcd_host_reset_and_restore+0x54/0x260\nufshcd_reset_and_restore+0x28c/0x57c\nufshcd_err_handler+0xeb8/0x1b6c\nprocess_one_work+0x288/0x964\nworker_thread+0x4bc/0xc7c\nkthread+0x15c/0x264\nret_from_fork+0x10/0x30", "A flaw was found in the Linux kernel's Universal Flash Storage (UFS) subsystem. A local attacker with low privileges could trigger a vulnerability during the handling of UFS device management command timeouts. If a command times out and its doorbell fails to clear, a subsequent completion can lead to a use-after-free condition on a stack-allocated structure. This can result in a system crash, causing a Denial of Service (DoS)." ],
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2023-11-07T00:00:00Z",
    "advisory" : "RHSA-2023:6583",
    "cpe" : "cpe:/a:redhat:enterprise_linux:9",
    "package" : "kernel-0:5.14.0-362.8.1.el9_3"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2023-11-07T00:00:00Z",
    "advisory" : "RHSA-2023:6583",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9",
    "package" : "kernel-0:5.14.0-362.8.1.el9_3"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 10",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Not affected",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Not affected",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "fix_state" : "Fix deferred",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2023-53387\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-53387\nhttps://lore.kernel.org/linux-cve-announce/2025091857-CVE-2023-53387-1fb7@gregkh/T" ],
  "name" : "CVE-2023-53387",
  "csaw" : false
}