CVE-2023-53428
BaseFortify
Publication date: 2025-09-18
Last updated on: 2025-12-11
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 6.2 (inc) to 6.4.16 (exc) |
| linux | linux_kernel | From 6.5 (inc) to 6.5.3 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-674 | The product does not properly control the amount of recursion that takes place, consuming excessive resources, such as allocated memory or the program stack. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the ARM SCMI Powercap driver in the Linux kernel, which uses a recursive algorithm to walk through a hierarchy of powercap zones. Because the zones can form very deep trees, the recursive approach can cause a kernel stack overflow. The fix replaces the recursive method with an iterative one using a dynamically allocated stack-like data structure to avoid this overflow.
How can this vulnerability impact me? :
The vulnerability can lead to a kernel stack overflow when processing deeply nested powercap zone hierarchies, potentially causing a kernel crash or instability. This could affect system reliability and availability.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version where the ARM SCMI Powercap driver no longer uses the recursive algorithm for walking powercap zones and instead uses the iterative approach with a dynamically allocated stack-like data structure. This update prevents kernel stack overflow caused by processing deeply nested powercap zone hierarchies.