CVE-2023-53583Linux vulnerability

5 documents5 sources
Severity
5.5MEDIUMNVD
EPSS
0.0%
top 98.22%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 4

Description

In the Linux kernel, the following vulnerability has been resolved: perf: RISC-V: Remove PERF_HES_STOPPED flag checking in riscv_pmu_start() Since commit 096b52fd2bb4 ("perf: RISC-V: throttle perf events") the perf_sample_event_took() function was added to report time spent in overflow interrupts. If the interrupt takes too long, the perf framework will lower the sysctl_perf_event_sample_rate and max_samples_per_tick. When hwc->interrupts is larger than max_samples_per_tick, the hwc->interrupt

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel6.16.1.40+2
Debianlinux/linux_kernel< 6.1.52-1+2
CVEListV5linux/linux096b52fd2bb4996fd68d22b3b7ad21a1296db9d3aeb62beaf9cbd0a72e7f97c9af6d3e7f76ce2946+3
debiandebian/linux< linux 6.1.52-1 (bookworm)

Patches

🔴Vulnerability Details

2
GHSA
GHSA-fr5x-v6h2-7cvx: In the Linux kernel, the following vulnerability has been resolved: perf: RISC-V: Remove PERF_HES_STOPPED flag checking in riscv_pmu_start() Since c2025-10-04
OSV
CVE-2023-53583: In the Linux kernel, the following vulnerability has been resolved: perf: RISC-V: Remove PERF_HES_STOPPED flag checking in riscv_pmu_start() Since com2025-10-04

📋Vendor Advisories

2
Red Hat
kernel: perf: RISC-V: Remove PERF_HES_STOPPED flag checking in riscv_pmu_start()2025-10-04
Debian
CVE-2023-53583: linux - In the Linux kernel, the following vulnerability has been resolved: perf: RISC-...2023