CVE-2023-53583
BaseFortify
Publication date: 2025-10-04
Last updated on: 2026-03-23
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.5 |
| linux | linux_kernel | From 6.2 (inc) to 6.4.5 (exc) |
| linux | linux_kernel | From 6.1 (inc) to 6.1.40 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's perf subsystem on RISC-V architectures. The issue arises because the RISC-V PMU driver does not properly update a flag (PERF_HES_STOPPED) after handling performance event overflows, unlike other PMU drivers. This causes a warning (WARN_ON_ONCE) when the perf framework attempts to restart throttled events, due to an unnecessary check in the riscv_pmu_start() function. The recommended fix is to remove this unnecessary flag check to prevent the warning.
How can this vulnerability impact me? :
The impact of this vulnerability is primarily a kernel warning (WARN_ON_ONCE) triggered during performance event handling on RISC-V systems. This warning could indicate improper handling of performance monitoring events, potentially leading to inaccurate performance data or system instability related to perf event throttling. However, it does not describe a direct security breach or exploit but rather a functional issue causing warnings and possible performance monitoring inaccuracies.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by observing kernel warning messages related to the perf subsystem on RISC-V architectures. Specifically, look for WARN_ON_ONCE() warnings in the kernel logs mentioning riscv_pmu_start() in drivers/perf/riscv_pmu.c. You can check for these warnings using the command: dmesg | grep riscv_pmu_start
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation is to update the Linux kernel to a version that includes the fix removing the PERF_HES_STOPPED flag checking in riscv_pmu_start(). This prevents the warning and potential issues caused by the incorrect handling of perf events on RISC-V. Until then, monitoring for the warning and avoiding heavy use of perf events on RISC-V systems may reduce impact.