{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2023-53859","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-12-09T01:27:17.828Z","datePublished":"2025-12-09T01:30:26.351Z","dateUpdated":"2026-05-11T19:52:54.089Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T19:52:54.089Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\ns390/idle: mark arch_cpu_idle() noinstr\n\nlinux-next commit (\"cpuidle: tracing: Warn about !rcu_is_watching()\")\nadds a new warning which hits on s390's arch_cpu_idle() function:\n\nRCU not on for: arch_cpu_idle+0x0/0x28\nWARNING: CPU: 2 PID: 0 at include/linux/trace_recursion.h:162 arch_ftrace_ops_list_func+0x24c/0x258\nModules linked in:\nCPU: 2 PID: 0 Comm: swapper/2 Not tainted 6.2.0-rc6-next-20230202 #4\nHardware name: IBM 8561 T01 703 (z/VM 7.3.0)\nKrnl PSW : 0404d00180000000 00000000002b55c0 (arch_ftrace_ops_list_func+0x250/0x258)\n           R:0 T:1 IO:0 EX:0 Key:0 M:1 W:0 P:0 AS:3 CC:1 PM:0 RI:0 EA:3\nKrnl GPRS: c0000000ffffbfff 0000000080000002 0000000000000026 0000000000000000\n           0000037ffffe3a28 0000037ffffe3a20 0000000000000000 0000000000000000\n           0000000000000000 0000000000f4acf6 00000000001044f0 0000037ffffe3cb0\n           0000000000000000 0000000000000000 00000000002b55bc 0000037ffffe3bb8\nKrnl Code: 00000000002b55b0: c02000840051        larl    %r2,0000000001335652\n           00000000002b55b6: c0e5fff512d1        brasl   %r14,0000000000157b58\n          #00000000002b55bc: af000000            mc      0,0\n          >00000000002b55c0: a7f4ffe7            brc     15,00000000002b558e\n           00000000002b55c4: 0707                bcr     0,%r7\n           00000000002b55c6: 0707                bcr     0,%r7\n           00000000002b55c8: eb6ff0480024        stmg    %r6,%r15,72(%r15)\n           00000000002b55ce: b90400ef            lgr     %r14,%r15\nCall Trace:\n [<00000000002b55c0>] arch_ftrace_ops_list_func+0x250/0x258\n([<00000000002b55bc>] arch_ftrace_ops_list_func+0x24c/0x258)\n [<0000000000f5f0fc>] ftrace_common+0x1c/0x20\n [<00000000001044f6>] arch_cpu_idle+0x6/0x28\n [<0000000000f4acf6>] default_idle_call+0x76/0x128\n [<00000000001cc374>] do_idle+0xf4/0x1b0\n [<00000000001cc6ce>] cpu_startup_entry+0x36/0x40\n [<0000000000119d00>] smp_start_secondary+0x140/0x150\n [<0000000000f5d2ae>] restart_int_handler+0x6e/0x90\n\nMark arch_cpu_idle() noinstr like all other architectures with\nCONFIG_ARCH_WANTS_NO_INSTR (should) have it to fix this."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["arch/s390/kernel/idle.c"],"versions":[{"version":"1098582a0f6c4e8fd28da0a6305f9233d02c9c1d","lessThan":"49aa49952116b8fd56bfb1e8c69bce179f49bece","status":"affected","versionType":"git"},{"version":"1098582a0f6c4e8fd28da0a6305f9233d02c9c1d","lessThan":"611c390217106c46e24e1af3db83187339d447ea","status":"affected","versionType":"git"},{"version":"1098582a0f6c4e8fd28da0a6305f9233d02c9c1d","lessThan":"fc60c4f12d8a056f20d8f4d0086a36c68ffa9fdc","status":"affected","versionType":"git"},{"version":"1098582a0f6c4e8fd28da0a6305f9233d02c9c1d","lessThan":"a9cbc1b471d291c865907542394f1c483b93a811","status":"affected","versionType":"git"},{"version":"788621afda4101ca0fae48de424040cda78193fe","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["arch/s390/kernel/idle.c"],"versions":[{"version":"5.9","status":"affected"},{"version":"0","lessThan":"5.9","status":"unaffected","versionType":"semver"},{"version":"5.15.99","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.16","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.2.3","lessThanOrEqual":"6.2.*","status":"unaffected","versionType":"semver"},{"version":"6.3","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.9","versionEndExcluding":"5.15.99"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.9","versionEndExcluding":"6.1.16"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.9","versionEndExcluding":"6.2.3"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.9","versionEndExcluding":"6.3"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.19.297"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/49aa49952116b8fd56bfb1e8c69bce179f49bece"},{"url":"https://git.kernel.org/stable/c/611c390217106c46e24e1af3db83187339d447ea"},{"url":"https://git.kernel.org/stable/c/fc60c4f12d8a056f20d8f4d0086a36c68ffa9fdc"},{"url":"https://git.kernel.org/stable/c/a9cbc1b471d291c865907542394f1c483b93a811"}],"title":"s390/idle: mark arch_cpu_idle() noinstr","x_generator":{"engine":"bippy-1.2.0"}}}}