Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Representative Line: Brace Yourself

      September 18, 2025

      Beyond the Pilot: A Playbook for Enterprise-Scale Agentic AI

      September 18, 2025

      GitHub launches MCP Registry to provide central location for trusted servers

      September 18, 2025

      MongoDB brings Search and Vector Search to self-managed versions of database

      September 18, 2025

      Distribution Release: Security Onion 2.4.180

      September 18, 2025

      Distribution Release: Omarchy 3.0.1

      September 17, 2025

      Distribution Release: Mauna Linux 25

      September 16, 2025

      Distribution Release: SparkyLinux 2025.09

      September 16, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      AI Momentum and Perficient’s Inclusion in Analyst Reports – Highlights From 2025 So Far

      September 18, 2025
      Recent

      AI Momentum and Perficient’s Inclusion in Analyst Reports – Highlights From 2025 So Far

      September 18, 2025

      Shopping Portal using Python Django & MySQL

      September 17, 2025

      Perficient Earns Adobe’s Real-time CDP Specialization

      September 17, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Valve Survey Reveals Slight Retreat in Steam-on-Linux Share

      September 18, 2025
      Recent

      Valve Survey Reveals Slight Retreat in Steam-on-Linux Share

      September 18, 2025

      Review: Elecrow’s All-in-one Starter Kit for Pico 2

      September 18, 2025

      FOSS Weekly #25.38: GNOME 49 Release, KDE Drama, sudo vs sudo-rs, Local AI on Android and More Linux Stuff

      September 18, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Security»Common Vulnerabilities and Exposures (CVEs)»CVE-2023-53135 – Riscv Linux Kernel Stack Out-of-Bounds Vulnerability

    CVE-2023-53135 – Riscv Linux Kernel Stack Out-of-Bounds Vulnerability

    May 2, 2025

    CVE ID : CVE-2023-53135

    Published : May 2, 2025, 4:15 p.m. | 34 minutes ago

    Description : In the Linux kernel, the following vulnerability has been resolved:

    riscv: Use READ_ONCE_NOCHECK in imprecise unwinding stack mode

    When CONFIG_FRAME_POINTER is unset, the stack unwinding function
    walk_stackframe randomly reads the stack and then, when KASAN is enabled,
    it can lead to the following backtrace:

    [ 0.000000] ==================================================================
    [ 0.000000] BUG: KASAN: stack-out-of-bounds in walk_stackframe+0xa6/0x11a
    [ 0.000000] Read of size 8 at addr ffffffff81807c40 by task swapper/0
    [ 0.000000]
    [ 0.000000] CPU: 0 PID: 0 Comm: swapper Not tainted 6.2.0-12919-g24203e6db61f #43
    [ 0.000000] Hardware name: riscv-virtio,qemu (DT)
    [ 0.000000] Call Trace:
    [ 0.000000] [] walk_stackframe+0x0/0x11a
    [ 0.000000] [] init_param_lock+0x26/0x2a
    [ 0.000000] [] walk_stackframe+0xa2/0x11a
    [ 0.000000] [] dump_stack_lvl+0x22/0x36
    [ 0.000000] [] print_report+0x198/0x4a8
    [ 0.000000] [] init_param_lock+0x26/0x2a
    [ 0.000000] [] walk_stackframe+0xa2/0x11a
    [ 0.000000] [] kasan_report+0x9a/0xc8
    [ 0.000000] [] walk_stackframe+0xa2/0x11a
    [ 0.000000] [] walk_stackframe+0xa2/0x11a
    [ 0.000000] [] desc_make_final+0x80/0x84
    [ 0.000000] [] stack_trace_save+0x88/0xa6
    [ 0.000000] [] filter_irq_stacks+0x72/0x76
    [ 0.000000] [] devkmsg_read+0x32a/0x32e
    [ 0.000000] [] kasan_save_stack+0x28/0x52
    [ 0.000000] [] desc_make_final+0x7c/0x84
    [ 0.000000] [] stack_trace_save+0x84/0xa6
    [ 0.000000] [] kasan_set_track+0x12/0x20
    [ 0.000000] [] __kasan_slab_alloc+0x58/0x5e
    [ 0.000000] [] __kmem_cache_create+0x21e/0x39a
    [ 0.000000] [] create_boot_cache+0x70/0x9c
    [ 0.000000] [] kmem_cache_init+0x6c/0x11e
    [ 0.000000] [] mm_init+0xd8/0xfe
    [ 0.000000] [] start_kernel+0x190/0x3ca
    [ 0.000000]
    [ 0.000000] The buggy address belongs to stack of task swapper/0
    [ 0.000000] and is located at offset 0 in frame:
    [ 0.000000] stack_trace_save+0x0/0xa6
    [ 0.000000]
    [ 0.000000] This frame has 1 object:
    [ 0.000000] [32, 56) ‘c’
    [ 0.000000]
    [ 0.000000] The buggy address belongs to the physical page:
    [ 0.000000] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x81a07
    [ 0.000000] flags: 0x1000(reserved|zone=0)
    [ 0.000000] raw: 0000000000001000 ff600003f1e3d150 ff600003f1e3d150 0000000000000000
    [ 0.000000] raw: 0000000000000000 0000000000000000 00000001ffffffff
    [ 0.000000] page dumped because: kasan: bad access detected
    [ 0.000000]
    [ 0.000000] Memory state around the buggy address:
    [ 0.000000] ffffffff81807b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    [ 0.000000] ffffffff81807b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    [ 0.000000] >ffffffff81807c00: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 00 f3
    [ 0.000000] ^
    [ 0.000000] ffffffff81807c80: f3 f3 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00
    [ 0.000000] ffffffff81807d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    [ 0.000000] ==================================================================

    Fix that by using READ_ONCE_NOCHECK when reading the stack in imprecise
    mode.

    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCVE-2023-53136 – Linux af_unix Struct PID Leak Vulnerability
    Next Article CVE-2023-53134 – “Broadcom bnxt_en Linux kernel Memory Allocation Vulnerability”

    Related Posts

    Development

    Cursor AI Code Editor Flaw Enables Silent Code Execution via Malicious Repositories

    September 14, 2025
    Development

    Introducing HybridPetya: Petya/NotPetya copycat with UEFI Secure Boot bypass

    September 14, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    Techland drops a new trailer for Dying Light: The Beast with a release date during Summer Game Fest

    News & Updates

    How to Start a Career in Technical Writing by Contributing to Open Source

    Development
    CodeSOD: Single or Mingle

    CodeSOD: Single or Mingle

    News & Updates

    Call of Duty movie confirmed — Paramount and Activision team up for live‑action adaptation

    News & Updates

    Highlights

    CVE-2025-51865 – Allenai Ai2 Playground Web Service IDOR

    July 22, 2025

    CVE ID : CVE-2025-51865

    Published : July 22, 2025, 3:15 p.m. | 9 hours, 29 minutes ago

    Description : Ai2 playground web service (playground.allenai.org) LLM chat through 2025-06-03 is vulnerable to Insecure Direct Object Reference (IDOR), allowing attackers to gain sensitvie information via enumerating thread keys in the URL.

    Severity: 8.8 | HIGH

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Retrieving Command Parameters in Laravel Artisan

    June 24, 2025

    Pacman: guida alla personalizzazione del gestore pacchetti di Arch Linux

    May 7, 2025

    CVE-2025-4041 – Optigo Networks ONS NC600 Command Injection Vulnerability

    May 6, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.