CVE-2023-52860: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: drivers/perf: hisi: use cpuhp_state_remove_instance_nocalls() for hisi_hns3_pmu uninit process When tearing down a 'hisi_hns3' PMU, we mistakenly run the CPU hotplug callbacks after the device has been unregistered, leading to fireworks when we try to execute empty function callbacks within the driver: | Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000 | CPU: 0 PID: 15 Comm: cpuhp/0 Tainted: G W O 5.12.0-rc4+ #1 | Hardware name: , BIOS KpxxxFPGA 1P B600 V143 04/22/2021 | pstate: 80400009 (Nzcv daif +PAN -UAO -TCO BTYPE=--) | pc : perf_pmu_migrate_context+0x98/0x38c | lr : perf_pmu_migrate_context+0x94/0x38c | | Call trace: | perf_pmu_migrate_context+0x98/0x38c | hisi_hns3_pmu_offline_cpu+0x104/0x12c [hisi_hns3_pmu] Use cpuhp_state_remove_instance_nocalls() instead of cpuhp_state_remove_instance() so that the notifiers don't execute after the PMU device has been unregistered. [will: Rewrote commit message]
AI Analysis
Technical Summary
CVE-2023-52860 is a vulnerability identified in the Linux kernel specifically related to the handling of the 'hisi_hns3' Performance Monitoring Unit (PMU) driver. The issue arises during the teardown process of the hisi_hns3 PMU device, where CPU hotplug callbacks are executed after the device has already been unregistered. This improper sequence leads to attempts to execute empty function callbacks within the driver, resulting in a NULL pointer dereference in kernel space. The kernel crash manifests as an inability to handle the NULL pointer dereference at virtual address 0x0, causing a system panic or kernel oops. The root cause is the use of the cpuhp_state_remove_instance() function, which invokes notifier callbacks even after device unregistration, instead of the safer cpuhp_state_remove_instance_nocalls() function that removes the instance without triggering callbacks. This vulnerability can cause system instability or denial of service (DoS) due to kernel crashes when CPUs are hotplugged or taken offline in systems using the affected driver. The vulnerability affects Linux kernel versions containing the hisi_hns3 PMU driver implementation prior to the patch that replaces cpuhp_state_remove_instance() with cpuhp_state_remove_instance_nocalls() in the driver code. There are no known exploits in the wild at the time of publication, and no CVSS score has been assigned yet. The vulnerability is technical and specific to hardware platforms using the HiSilicon HNS3 network interface cards or related hardware that utilize this PMU driver. The fix involves a code change in the kernel driver to prevent execution of callbacks after device unregistration, thereby avoiding the NULL pointer dereference and subsequent kernel crash.
Potential Impact
For European organizations, the primary impact of CVE-2023-52860 is potential system instability and denial of service on Linux systems running affected kernel versions with the hisi_hns3 PMU driver. This is particularly relevant for enterprises and data centers using HiSilicon HNS3-based network interface cards or servers with this hardware integration. A kernel crash due to this vulnerability could lead to unexpected system reboots, service interruptions, and potential data loss or corruption if critical processes are terminated abruptly. Organizations relying on Linux servers for critical infrastructure, cloud services, or telecommunications may experience degraded service availability. Although this vulnerability does not appear to allow privilege escalation or remote code execution, the denial of service impact can disrupt operations and affect service level agreements (SLAs). Since the vulnerability is triggered during CPU hotplug events, environments that dynamically manage CPU resources (e.g., virtualized or containerized infrastructures) may be more exposed. The absence of known exploits reduces immediate risk, but the vulnerability should be addressed proactively to maintain system reliability and security posture.
Mitigation Recommendations
European organizations should take the following specific mitigation steps: 1) Identify Linux systems running kernels with the hisi_hns3 PMU driver, especially those deployed on hardware platforms using HiSilicon HNS3 network cards. 2) Apply the official Linux kernel patch that replaces cpuhp_state_remove_instance() with cpuhp_state_remove_instance_nocalls() in the hisi_hns3 PMU driver code. This patch is essential to prevent kernel crashes during CPU hotplug operations. 3) If immediate patching is not feasible, consider temporarily disabling CPU hotplug features or avoid CPU offline/online operations on affected systems to reduce the risk of triggering the vulnerability. 4) Monitor system logs for kernel oops or panic messages related to perf_pmu_migrate_context or hisi_hns3_pmu_offline_cpu functions, which may indicate attempts to exploit or accidental triggering of the vulnerability. 5) Coordinate with hardware vendors and Linux distribution maintainers to ensure timely updates and backported patches are applied in enterprise environments. 6) Incorporate this vulnerability into vulnerability management and patching workflows to ensure ongoing compliance and risk reduction. 7) For virtualized environments, ensure hypervisor and guest OS kernel versions are updated to prevent cascading failures due to CPU hotplug events.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden, Finland
CVE-2023-52860: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: drivers/perf: hisi: use cpuhp_state_remove_instance_nocalls() for hisi_hns3_pmu uninit process When tearing down a 'hisi_hns3' PMU, we mistakenly run the CPU hotplug callbacks after the device has been unregistered, leading to fireworks when we try to execute empty function callbacks within the driver: | Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000 | CPU: 0 PID: 15 Comm: cpuhp/0 Tainted: G W O 5.12.0-rc4+ #1 | Hardware name: , BIOS KpxxxFPGA 1P B600 V143 04/22/2021 | pstate: 80400009 (Nzcv daif +PAN -UAO -TCO BTYPE=--) | pc : perf_pmu_migrate_context+0x98/0x38c | lr : perf_pmu_migrate_context+0x94/0x38c | | Call trace: | perf_pmu_migrate_context+0x98/0x38c | hisi_hns3_pmu_offline_cpu+0x104/0x12c [hisi_hns3_pmu] Use cpuhp_state_remove_instance_nocalls() instead of cpuhp_state_remove_instance() so that the notifiers don't execute after the PMU device has been unregistered. [will: Rewrote commit message]
AI-Powered Analysis
Technical Analysis
CVE-2023-52860 is a vulnerability identified in the Linux kernel specifically related to the handling of the 'hisi_hns3' Performance Monitoring Unit (PMU) driver. The issue arises during the teardown process of the hisi_hns3 PMU device, where CPU hotplug callbacks are executed after the device has already been unregistered. This improper sequence leads to attempts to execute empty function callbacks within the driver, resulting in a NULL pointer dereference in kernel space. The kernel crash manifests as an inability to handle the NULL pointer dereference at virtual address 0x0, causing a system panic or kernel oops. The root cause is the use of the cpuhp_state_remove_instance() function, which invokes notifier callbacks even after device unregistration, instead of the safer cpuhp_state_remove_instance_nocalls() function that removes the instance without triggering callbacks. This vulnerability can cause system instability or denial of service (DoS) due to kernel crashes when CPUs are hotplugged or taken offline in systems using the affected driver. The vulnerability affects Linux kernel versions containing the hisi_hns3 PMU driver implementation prior to the patch that replaces cpuhp_state_remove_instance() with cpuhp_state_remove_instance_nocalls() in the driver code. There are no known exploits in the wild at the time of publication, and no CVSS score has been assigned yet. The vulnerability is technical and specific to hardware platforms using the HiSilicon HNS3 network interface cards or related hardware that utilize this PMU driver. The fix involves a code change in the kernel driver to prevent execution of callbacks after device unregistration, thereby avoiding the NULL pointer dereference and subsequent kernel crash.
Potential Impact
For European organizations, the primary impact of CVE-2023-52860 is potential system instability and denial of service on Linux systems running affected kernel versions with the hisi_hns3 PMU driver. This is particularly relevant for enterprises and data centers using HiSilicon HNS3-based network interface cards or servers with this hardware integration. A kernel crash due to this vulnerability could lead to unexpected system reboots, service interruptions, and potential data loss or corruption if critical processes are terminated abruptly. Organizations relying on Linux servers for critical infrastructure, cloud services, or telecommunications may experience degraded service availability. Although this vulnerability does not appear to allow privilege escalation or remote code execution, the denial of service impact can disrupt operations and affect service level agreements (SLAs). Since the vulnerability is triggered during CPU hotplug events, environments that dynamically manage CPU resources (e.g., virtualized or containerized infrastructures) may be more exposed. The absence of known exploits reduces immediate risk, but the vulnerability should be addressed proactively to maintain system reliability and security posture.
Mitigation Recommendations
European organizations should take the following specific mitigation steps: 1) Identify Linux systems running kernels with the hisi_hns3 PMU driver, especially those deployed on hardware platforms using HiSilicon HNS3 network cards. 2) Apply the official Linux kernel patch that replaces cpuhp_state_remove_instance() with cpuhp_state_remove_instance_nocalls() in the hisi_hns3 PMU driver code. This patch is essential to prevent kernel crashes during CPU hotplug operations. 3) If immediate patching is not feasible, consider temporarily disabling CPU hotplug features or avoid CPU offline/online operations on affected systems to reduce the risk of triggering the vulnerability. 4) Monitor system logs for kernel oops or panic messages related to perf_pmu_migrate_context or hisi_hns3_pmu_offline_cpu functions, which may indicate attempts to exploit or accidental triggering of the vulnerability. 5) Coordinate with hardware vendors and Linux distribution maintainers to ensure timely updates and backported patches are applied in enterprise environments. 6) Incorporate this vulnerability into vulnerability management and patching workflows to ensure ongoing compliance and risk reduction. 7) For virtualized environments, ensure hypervisor and guest OS kernel versions are updated to prevent cascading failures due to CPU hotplug events.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-05-21T15:19:24.261Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9831c4522896dcbe775b
Added to database: 5/21/2025, 9:09:05 AM
Last enriched: 7/1/2025, 7:56:27 AM
Last updated: 8/1/2025, 2:50:02 AM
Views: 9
Related Threats
CVE-2025-5296: CWE-59 Improper Link Resolution Before File Access ('Link Following') in Schneider Electric SESU
HighCVE-2025-6625: CWE-20 Improper Input Validation in Schneider Electric Modicon M340
HighCVE-2025-57703: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Delta Electronics DIAEnergie
MediumCVE-2025-57702: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Delta Electronics DIAEnergie
MediumCVE-2025-57701: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Delta Electronics DIAEnergie
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.