Skip to main content

CVE-2023-52859: Vulnerability in Linux Linux

High
VulnerabilityCVE-2023-52859cvecve-2023-52859
Published: Tue May 21 2024 (05/21/2024, 15:31:52 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: perf: hisi: Fix use-after-free when register pmu fails When we fail to register the uncore pmu, the pmu context may not been allocated. The error handing will call cpuhp_state_remove_instance() to call uncore pmu offline callback, which migrate the pmu context. Since that's liable to lead to some kind of use-after-free. Use cpuhp_state_remove_instance_nocalls() instead of cpuhp_state_remove_instance() so that the notifiers don't execute after the PMU device has been failed to register.

AI-Powered Analysis

AILast updated: 07/01/2025, 07:56:11 UTC

Technical Analysis

CVE-2023-52859 is a vulnerability identified in the Linux kernel related to the performance monitoring unit (PMU) subsystem, specifically the handling of the HiSilicon (hisi) uncore PMU. The issue arises when the kernel attempts to register an uncore PMU device and the registration fails. Under normal operation, the PMU context is allocated and managed properly. However, if the registration fails, the PMU context may not be allocated, but the error handling code still calls cpuhp_state_remove_instance(), which triggers the uncore PMU offline callback. This callback attempts to migrate the PMU context, leading to a use-after-free condition because the context does not exist or has already been freed. This use-after-free vulnerability could potentially lead to kernel memory corruption, causing system instability, crashes, or potentially enabling privilege escalation or arbitrary code execution if exploited. The fix involves replacing the call to cpuhp_state_remove_instance() with cpuhp_state_remove_instance_nocalls(), which prevents the execution of notifiers after the PMU device registration failure, thereby avoiding the use-after-free scenario. This vulnerability affects Linux kernel versions containing the specified commit hashes and is relevant to systems using the hisi uncore PMU driver. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to systems running Linux kernels with the affected hisi uncore PMU driver, which is commonly found in servers and embedded systems using HiSilicon hardware components. The use-after-free condition could lead to kernel crashes or memory corruption, potentially causing denial of service or enabling attackers to escalate privileges if combined with other vulnerabilities. This is particularly critical for data centers, cloud service providers, and enterprises relying on Linux-based infrastructure for critical operations. The impact could extend to service outages, data integrity issues, and increased risk of targeted attacks exploiting kernel vulnerabilities. Given the absence of known exploits, the immediate risk is moderate, but the potential for future exploitation necessitates prompt patching. Organizations in sectors such as finance, telecommunications, and government, which often use Linux servers and have stringent uptime and security requirements, may face significant operational and reputational risks if this vulnerability is exploited.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernels to versions that include the patch for CVE-2023-52859. Since the vulnerability is related to the hisi uncore PMU driver, organizations using HiSilicon hardware should verify the kernel versions deployed and apply vendor-provided patches or mainline kernel updates promptly. Additionally, organizations should audit their systems to identify any use of the affected PMU drivers and disable or restrict access to performance monitoring features if immediate patching is not feasible. Implementing kernel live patching solutions can reduce downtime during updates. Monitoring kernel logs for unusual errors related to PMU registration failures can help detect exploitation attempts. Finally, maintaining a robust incident response plan and ensuring backups and system snapshots are current will mitigate potential damage from exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-05-21T15:19:24.260Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9831c4522896dcbe7757

Added to database: 5/21/2025, 9:09:05 AM

Last enriched: 7/1/2025, 7:56:11 AM

Last updated: 8/14/2025, 6:06:20 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats