CVE-2023-53215
BaseFortify
Publication date: 2025-09-15
Last updated on: 2025-12-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | to 4.14.322 (exc) |
| linux | linux_kernel | From 4.15 (inc) to 4.19.291 (exc) |
| linux | linux_kernel | From 4.20 (inc) to 5.4.251 (exc) |
| linux | linux_kernel | From 5.5 (inc) to 5.10.188 (exc) |
| linux | linux_kernel | From 5.11 (inc) to 5.15.150 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 6.1.42 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.4.7 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's task scheduler where the load balancer tries to migrate a task that has migration disabled to its current running CPU, triggering a warning. The issue arises because the load balancer selects a new destination CPU for the task, but if the task is migration disabled and only allowed to run on its current CPU, the balancer ends up selecting the same CPU again, causing a superfluous warning. The patch fixes this by adjusting the CPU selection mask to exclude CPUs from the busiest group, preventing this unnecessary warning.
How can this vulnerability impact me? :
The impact of this vulnerability is primarily related to unnecessary warnings in the kernel logs due to the scheduler attempting to migrate migration-disabled tasks to their current CPU. This does not indicate a security breach or system compromise but could lead to confusion or noise in system logs, potentially complicating debugging or system monitoring.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring the Linux kernel logs for the specific warning message triggered by the balancer when it tries to balance a migration disabled task to its current running CPU. You can check the kernel logs using the command: dmesg | grep 'WARNING: CPU.*set_task_cpu'. This will help identify if the warning described in the vulnerability appears on your system.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability has been resolved by a patch that changes the CPU selection mask during load balancing to exclude CPUs from the busiest group, preventing the warning from triggering. Immediate mitigation involves updating your Linux kernel to a version that includes this fix. Until then, monitoring for the warning and avoiding workloads that trigger migration disabled tasks on overlapped CPU groups may help reduce occurrences.