CVE-2023-53563
BaseFortify
Publication date: 2025-10-04
Last updated on: 2026-03-21
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 6.5 (inc) to 6.5.3 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.4.16 (exc) |
| linux | linux_kernel | From 6.1 (inc) to 6.1.53 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's amd-pstate-ut driver where the functions amd_pstate_ut_check_perf() and amd_pstate_ut_check_freq() use cpufreq_cpu_get() to get the CPU policy but fail to release it by not calling cpufreq_cpu_put(). This causes the CPU policy to remain locked, blocking any other process trying to access it indefinitely, which can lead to a kernel panic or system hang.
How can this vulnerability impact me? :
The vulnerability can cause the system to hang or panic when the amd-pstate-ut driver is loaded or when the amd_pstate mode is changed. This happens because the CPU policy remains locked and other processes are blocked indefinitely, potentially leading to system instability and denial of service.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by observing kernel panic or hung task messages related to the amd-pstate-ut driver in the system logs. Specifically, look for messages indicating tasks blocked for more than 120 seconds and stack traces involving cpufreq functions. You can check the kernel log using the command: dmesg | grep -i 'amd-pstate-ut' or dmesg | grep -i 'blocked for more than 120 seconds'.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include avoiding loading the amd-pstate-ut driver until a patched kernel version is applied. If the driver is already loaded, avoid changing the amd_pstate mode to prevent triggering the kernel panic. Applying the kernel update that includes the fix calling cpufreq_cpu_put() as necessary is the definitive solution.