CVE-2023-53319
BaseFortify
Publication date: 2025-09-16
Last updated on: 2025-12-01
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 6.4 (inc) to 6.4.8 (exc) |
| linux | linux_kernel | 6.5 |
| linux | linux_kernel | 6.5 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's KVM module for arm64 architecture. There is no synchronization between the finalize_pkvm() and kvm_arm_init() initialization calls. As a result, finalize_pkvm() can proceed even if kvm_arm_init() fails, leading to warnings on all CPUs and eventually causing a hypervisor (HYP) panic and kernel panic. The issue is fixed by ensuring that finalize_pkvm() checks for the successful initialization of kvm_arm_init() before continuing.
How can this vulnerability impact me? :
This vulnerability can cause a system-wide kernel panic on affected arm64 Linux systems using KVM, leading to system crashes and denial of service. The failure to properly handle initialization errors in the KVM hypervisor can result in instability and inability to run virtual machines reliably.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by checking the system logs for specific warning messages and kernel panic traces related to KVM on arm64. Look for warnings such as 'IPA Size Limit: 48 bits', 'Failed to init hyp memory protection', 'error initializing Hyp mode: -22', and kernel panic messages mentioning 'HYP panic' and 'kvm_arm_init failure'. You can use commands like 'dmesg | grep -i kvm' or 'journalctl -k | grep -i kvm' to search for these messages in the kernel logs.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version where the fix is applied, which ensures that finalize_pkvm() checks the successful initialization of kvm_arm_init() before proceeding. Until the update is applied, monitoring for the described warnings and avoiding workloads that trigger KVM on affected arm64 systems may reduce risk.