CVE-2023-53742
BaseFortify
Publication date: 2025-12-08
Last updated on: 2025-12-08
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 5.15.78 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel involves the use of READ_ONCE() in the function read_instrumented_memory(). On certain arm64 configurations with CONFIG_LTO enabled, READ_ONCE() can be promoted to a full atomic acquire instruction that cannot be used on unaligned memory addresses, causing kernel paging faults and crashes. The fix avoids using READ_ONCE() in this function and instead uses a volatile type cast to perform the memory access, which may not guarantee atomicity but prevents the fault.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash or experience internal errors due to unaligned memory access faults on affected arm64 systems. This can lead to system instability, unexpected reboots, or denial of service conditions.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is fixed by avoiding the use of READ_ONCE() in read_instrumented_memory() and instead forcing the compiler to do the required access by casting to the appropriate volatile type. To mitigate this vulnerability, you should update your Linux kernel to a version that includes this fix. There are no specific immediate configuration changes or commands mentioned to mitigate the issue other than applying the patch or kernel update.