CVE-2023-53496
BaseFortify
Publication date: 2025-10-01
Last updated on: 2026-01-16
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 6.5 (inc) to 6.5.5 (exc) |
| linux | linux_kernel | 6.6 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's UV platform code, where it attempts to build tables for bidirectional socket-to-node lookups. When the number of CPUs (nr_cpus) is set smaller than the actual number present, the mapping information for unused CPUs is missing. This causes the building function to skip some nodes or sockets and leave invalid entries (-1), which later causes kernel crashes (oopses). The issue arises because the code loops over all CPUs to create these lookups, but if a CPU is not present, the lookup cannot start. The fix involves changing the approach to loop over all APICIDs mapped to valid NUMA nodes instead of CPUs, avoiding problems with disabled CPUs.
How can this vulnerability impact me? :
This vulnerability can cause kernel crashes (oopses) due to invalid socket-to-node lookup tables when the system's CPU configuration is inconsistent. Such crashes can lead to system instability, unexpected reboots, or downtime, potentially affecting system availability and reliability.