CVE-2023-53216
BaseFortify
Publication date: 2025-09-15
Last updated on: 2025-12-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.10.165 (inc) to 5.10.175 (exc) |
| linux | linux_kernel | From 5.15.90 (inc) to 5.15.103 (exc) |
| linux | linux_kernel | From 6.1.8 (inc) to 6.1.18 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.2.5 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel on arm64 architecture where the efi_rt_lock was not implemented as a raw_spinlock. This caused issues when calling EFI runtime services, which require preemption to be disabled due to their use of different translation tables and SIMD registers. The problem led to a BUG triggered by a sleeping function being called from an invalid context, causing kernel instability. The fix was to make efi_rt_lock a raw_spinlock to properly disable preemption during EFI runtime service calls.
How can this vulnerability impact me? :
This vulnerability can cause kernel instability or crashes when EFI runtime services are called on affected arm64 Linux kernels. It may result in BUG messages and potentially disrupt system operation, especially on systems using real-time kernels and EFI runtime services, leading to reliability issues.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by observing kernel logs for specific BUG messages related to sleeping functions called from invalid contexts involving efi_rt_lock. You can check the kernel log using commands like 'dmesg | grep -i efi_rt_lock' or 'journalctl -k | grep -i efi_rt_lock' to find traces of the BUG message and related stack traces indicating the issue.
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation is to update the Linux kernel to a version that includes the fix, which makes efi_rt_lock a raw_spinlock to avoid preemption issues. Until then, avoid running the vulnerable kernel version (6.2.0-rc3-rt1) on affected hardware, or disable EFI runtime services if possible.