CVE-2023-53859 — Improper Handling of Missing Special Element in Linux
Severity
5.5MEDIUM
No vectorEPSS
0.0%
top 90.17%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 9
Description
In the Linux kernel, the following vulnerability has been resolved:
s390/idle: mark arch_cpu_idle() noinstr
linux-next commit ("cpuidle: tracing: Warn about !rcu_is_watching()")
adds a new warning which hits on s390's arch_cpu_idle() function:
RCU not on for: arch_cpu_idle+0x0/0x28
WARNING: CPU: 2 PID: 0 at include/linux/trace_recursion.h:162 arch_ftrace_ops_list_func+0x24c/0x258
Modules linked in:
CPU: 2 PID: 0 Comm: swapper/2 Not tainted 6.2.0-rc6-next-20230202 #4
Hardware name: IBM 8561 T0…
Affected Packages4 packages
▶CVEListV5linux/linux1098582a0f6c4e8fd28da0a6305f9233d02c9c1d — 49aa49952116b8fd56bfb1e8c69bce179f49bece+5
🔴Vulnerability Details
3OSV▶
CVE-2023-53859: In the Linux kernel, the following vulnerability has been resolved: s390/idle: mark arch_cpu_idle() noinstr linux-next commit ("cpuidle: tracing: Warn↗2025-12-09
GHSA▶
GHSA-vr4h-f46q-wpgf: In the Linux kernel, the following vulnerability has been resolved:
s390/idle: mark arch_cpu_idle() noinstr
linux-next commit ("cpuidle: tracing: Wa↗2025-12-09