CVE-2023-53859Improper Handling of Missing Special Element in Linux

Severity
5.5MEDIUM
No vector
EPSS
0.0%
top 90.17%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 9

Description

In the Linux kernel, the following vulnerability has been resolved: s390/idle: mark arch_cpu_idle() noinstr linux-next commit ("cpuidle: tracing: Warn about !rcu_is_watching()") adds a new warning which hits on s390's arch_cpu_idle() function: RCU not on for: arch_cpu_idle+0x0/0x28 WARNING: CPU: 2 PID: 0 at include/linux/trace_recursion.h:162 arch_ftrace_ops_list_func+0x24c/0x258 Modules linked in: CPU: 2 PID: 0 Comm: swapper/2 Not tainted 6.2.0-rc6-next-20230202 #4 Hardware name: IBM 8561 T0

Affected Packages4 packages

Linuxlinux/linux_kernel5.9.05.15.99+2
Debianlinux/linux_kernel< 6.1.20-1+2
CVEListV5linux/linux1098582a0f6c4e8fd28da0a6305f9233d02c9c1d49aa49952116b8fd56bfb1e8c69bce179f49bece+5
debiandebian/linux< linux 6.1.20-1 (bookworm)

🔴Vulnerability Details

3
OSV
s390/idle: mark arch_cpu_idle() noinstr2025-12-09
OSV
CVE-2023-53859: In the Linux kernel, the following vulnerability has been resolved: s390/idle: mark arch_cpu_idle() noinstr linux-next commit ("cpuidle: tracing: Warn2025-12-09
GHSA
GHSA-vr4h-f46q-wpgf: In the Linux kernel, the following vulnerability has been resolved: s390/idle: mark arch_cpu_idle() noinstr linux-next commit ("cpuidle: tracing: Wa2025-12-09

📋Vendor Advisories

2
Red Hat
kernel: s390/idle: mark arch_cpu_idle() noinstr2025-12-09
Debian
CVE-2023-53859: linux - In the Linux kernel, the following vulnerability has been resolved: s390/idle: ...2023

🕵️Threat Intelligence

1
Wiz
CVE-2023-53859 Impact, Exploitability, and Mitigation Steps | Wiz