CVE-2023-52859: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: perf: hisi: Fix use-after-free when register pmu fails When we fail to register the uncore pmu, the pmu context may not been allocated. The error handing will call cpuhp_state_remove_instance() to call uncore pmu offline callback, which migrate the pmu context. Since that's liable to lead to some kind of use-after-free. Use cpuhp_state_remove_instance_nocalls() instead of cpuhp_state_remove_instance() so that the notifiers don't execute after the PMU device has been failed to register.
AI Analysis
Technical Summary
CVE-2023-52859 is a vulnerability identified in the Linux kernel related to the performance monitoring unit (PMU) subsystem, specifically the handling of the HiSilicon (hisi) uncore PMU. The issue arises when the kernel attempts to register an uncore PMU device and the registration fails. Under normal operation, the PMU context is allocated and managed properly. However, if the registration fails, the PMU context may not be allocated, but the error handling code still calls cpuhp_state_remove_instance(), which triggers the uncore PMU offline callback. This callback attempts to migrate the PMU context, leading to a use-after-free condition because the context does not exist or has already been freed. This use-after-free vulnerability could potentially lead to kernel memory corruption, causing system instability, crashes, or potentially enabling privilege escalation or arbitrary code execution if exploited. The fix involves replacing the call to cpuhp_state_remove_instance() with cpuhp_state_remove_instance_nocalls(), which prevents the execution of notifiers after the PMU device registration failure, thereby avoiding the use-after-free scenario. This vulnerability affects Linux kernel versions containing the specified commit hashes and is relevant to systems using the hisi uncore PMU driver. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running Linux kernels with the affected hisi uncore PMU driver, which is commonly found in servers and embedded systems using HiSilicon hardware components. The use-after-free condition could lead to kernel crashes or memory corruption, potentially causing denial of service or enabling attackers to escalate privileges if combined with other vulnerabilities. This is particularly critical for data centers, cloud service providers, and enterprises relying on Linux-based infrastructure for critical operations. The impact could extend to service outages, data integrity issues, and increased risk of targeted attacks exploiting kernel vulnerabilities. Given the absence of known exploits, the immediate risk is moderate, but the potential for future exploitation necessitates prompt patching. Organizations in sectors such as finance, telecommunications, and government, which often use Linux servers and have stringent uptime and security requirements, may face significant operational and reputational risks if this vulnerability is exploited.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernels to versions that include the patch for CVE-2023-52859. Since the vulnerability is related to the hisi uncore PMU driver, organizations using HiSilicon hardware should verify the kernel versions deployed and apply vendor-provided patches or mainline kernel updates promptly. Additionally, organizations should audit their systems to identify any use of the affected PMU drivers and disable or restrict access to performance monitoring features if immediate patching is not feasible. Implementing kernel live patching solutions can reduce downtime during updates. Monitoring kernel logs for unusual errors related to PMU registration failures can help detect exploitation attempts. Finally, maintaining a robust incident response plan and ensuring backups and system snapshots are current will mitigate potential damage from exploitation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland
CVE-2023-52859: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: perf: hisi: Fix use-after-free when register pmu fails When we fail to register the uncore pmu, the pmu context may not been allocated. The error handing will call cpuhp_state_remove_instance() to call uncore pmu offline callback, which migrate the pmu context. Since that's liable to lead to some kind of use-after-free. Use cpuhp_state_remove_instance_nocalls() instead of cpuhp_state_remove_instance() so that the notifiers don't execute after the PMU device has been failed to register.
AI-Powered Analysis
Technical Analysis
CVE-2023-52859 is a vulnerability identified in the Linux kernel related to the performance monitoring unit (PMU) subsystem, specifically the handling of the HiSilicon (hisi) uncore PMU. The issue arises when the kernel attempts to register an uncore PMU device and the registration fails. Under normal operation, the PMU context is allocated and managed properly. However, if the registration fails, the PMU context may not be allocated, but the error handling code still calls cpuhp_state_remove_instance(), which triggers the uncore PMU offline callback. This callback attempts to migrate the PMU context, leading to a use-after-free condition because the context does not exist or has already been freed. This use-after-free vulnerability could potentially lead to kernel memory corruption, causing system instability, crashes, or potentially enabling privilege escalation or arbitrary code execution if exploited. The fix involves replacing the call to cpuhp_state_remove_instance() with cpuhp_state_remove_instance_nocalls(), which prevents the execution of notifiers after the PMU device registration failure, thereby avoiding the use-after-free scenario. This vulnerability affects Linux kernel versions containing the specified commit hashes and is relevant to systems using the hisi uncore PMU driver. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running Linux kernels with the affected hisi uncore PMU driver, which is commonly found in servers and embedded systems using HiSilicon hardware components. The use-after-free condition could lead to kernel crashes or memory corruption, potentially causing denial of service or enabling attackers to escalate privileges if combined with other vulnerabilities. This is particularly critical for data centers, cloud service providers, and enterprises relying on Linux-based infrastructure for critical operations. The impact could extend to service outages, data integrity issues, and increased risk of targeted attacks exploiting kernel vulnerabilities. Given the absence of known exploits, the immediate risk is moderate, but the potential for future exploitation necessitates prompt patching. Organizations in sectors such as finance, telecommunications, and government, which often use Linux servers and have stringent uptime and security requirements, may face significant operational and reputational risks if this vulnerability is exploited.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernels to versions that include the patch for CVE-2023-52859. Since the vulnerability is related to the hisi uncore PMU driver, organizations using HiSilicon hardware should verify the kernel versions deployed and apply vendor-provided patches or mainline kernel updates promptly. Additionally, organizations should audit their systems to identify any use of the affected PMU drivers and disable or restrict access to performance monitoring features if immediate patching is not feasible. Implementing kernel live patching solutions can reduce downtime during updates. Monitoring kernel logs for unusual errors related to PMU registration failures can help detect exploitation attempts. Finally, maintaining a robust incident response plan and ensuring backups and system snapshots are current will mitigate potential damage from exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-05-21T15:19:24.260Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9831c4522896dcbe7757
Added to database: 5/21/2025, 9:09:05 AM
Last enriched: 7/1/2025, 7:56:11 AM
Last updated: 8/14/2025, 6:06:20 AM
Views: 10
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.