Improper Locking Affecting kernel-debuginfo-common-aarch64 package, versions <0:6.1.29-47.49.amzn2023


Severity

Recommended
high

Based on Amazon Linux security rating.

Threat Intelligence

EPSS
0.04% (13th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-AMZN2023-KERNELDEBUGINFOCOMMONAARCH64-13705518
  • published24 Oct 2025
  • disclosed4 Oct 2025

Introduced: 4 Oct 2025

NewCVE-2023-53587  (opens in a new tab)
CWE-667  (opens in a new tab)

How to fix?

Upgrade Amazon-Linux:2023 kernel-debuginfo-common-aarch64 to version 0:6.1.29-47.49.amzn2023 or higher.
This issue was patched in ALAS2023-2023-184.

NVD Description

Note: Versions mentioned in the description apply only to the upstream kernel-debuginfo-common-aarch64 package and not the kernel-debuginfo-common-aarch64 package as distributed by Amazon-Linux. See How to fix? for Amazon-Linux:2023 relevant fixed versions and status.

In the Linux kernel, the following vulnerability has been resolved:

ring-buffer: Sync IRQ works before buffer destruction

If something was written to the buffer just before destruction, it may be possible (maybe not in a real system, but it did happen in ARCH=um with time-travel) to destroy the ringbuffer before the IRQ work ran, leading this KASAN report (or a crash without KASAN):

BUG: KASAN: slab-use-after-free in irq_work_run_list+0x11a/0x13a
Read of size 8 at addr 000000006d640a48 by task swapper/0

CPU: 0 PID: 0 Comm: swapper Tainted: G W O 6.3.0-rc1 #7 Stack: 60c4f20f 0c203d48 41b58ab3 60f224fc 600477fa 60f35687 60c4f20f 601273dd 00000008 6101eb00 6101eab0 615be548 Call Trace: [&lt;60047a58&gt;] show_stack+0x25e/0x282 [&lt;60c609e0&gt;] dump_stack_lvl+0x96/0xfd [&lt;60c50d4c&gt;] print_report+0x1a7/0x5a8 [&lt;603078d3&gt;] kasan_report+0xc1/0xe9 [&lt;60308950&gt;] __asan_report_load8_noabort+0x1b/0x1d [&lt;60232844&gt;] irq_work_run_list+0x11a/0x13a [&lt;602328b4&gt;] irq_work_tick+0x24/0x34 [&lt;6017f9dc&gt;] update_process_times+0x162/0x196 [&lt;6019f335&gt;] tick_sched_handle+0x1a4/0x1c3 [&lt;6019fd9e&gt;] tick_sched_timer+0x79/0x10c [&lt;601812b9&gt;] __hrtimer_run_queues.constprop.0+0x425/0x695 [&lt;60182913&gt;] hrtimer_interrupt+0x16c/0x2c4 [&lt;600486a3&gt;] um_timer+0x164/0x183 [...]

Allocated by task 411: save_stack_trace+0x99/0xb5 stack_trace_save+0x81/0x9b kasan_save_stack+0x2d/0x54 kasan_set_track+0x34/0x3e kasan_save_alloc_info+0x25/0x28 ____kasan_kmalloc+0x8b/0x97 __kasan_kmalloc+0x10/0x12 __kmalloc+0xb2/0xe8 load_elf_phdrs+0xee/0x182 [...]

The buggy address belongs to the object at 000000006d640800 which belongs to the cache kmalloc-1k of size 1024 The buggy address is located 584 bytes inside of freed 1024-byte region [000000006d640800, 000000006d640c00)

Add the appropriate irq_work_sync() so the work finishes before the buffers are destroyed.

Prior to the commit in the Fixes tag below, there was only a single global IRQ work, so this issue didn't exist.

CVSS Base Scores

version 3.1