-

CVE-2023-54267

In the Linux kernel, the following vulnerability has been resolved:

powerpc/pseries: Rework lppaca_shared_proc() to avoid DEBUG_PREEMPT

lppaca_shared_proc() takes a pointer to the lppaca which is typically
accessed through get_lppaca().  With DEBUG_PREEMPT enabled, this leads
to checking if preemption is enabled, for example:

  BUG: using smp_processor_id() in preemptible [00000000] code: grep/10693
  caller is lparcfg_data+0x408/0x19a0
  CPU: 4 PID: 10693 Comm: grep Not tainted 6.5.0-rc3 #2
  Call Trace:
    dump_stack_lvl+0x154/0x200 (unreliable)
    check_preemption_disabled+0x214/0x220
    lparcfg_data+0x408/0x19a0
    ...

This isn't actually a problem however, as it does not matter which
lppaca is accessed, the shared proc state will be the same.
vcpudispatch_stats_procfs_init() already works around this by disabling
preemption, but the lparcfg code does not, erroring any time
/proc/powerpc/lparcfg is accessed with DEBUG_PREEMPT enabled.

Instead of disabling preemption on the caller side, rework
lppaca_shared_proc() to not take a pointer and instead directly access
the lppaca, bypassing any potential preemption checks.

[mpe: Rework to avoid needing a definition in paca.h and lppaca.h]
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 953c54dfdc5d3eb7243ed902b50acb5ea1db4355
Version f13c13a005127b5dc5daaca190277a062d946e63
Status affected
Version < 2935443dc9c28499223d8c881474259e4b998f2a
Version f13c13a005127b5dc5daaca190277a062d946e63
Status affected
Version < 4c8568cf4c45b415854195c8832b557cdefba57a
Version f13c13a005127b5dc5daaca190277a062d946e63
Status affected
Version < 3c5e8e666794d7dde6d14ea846c6c04f2bb34900
Version f13c13a005127b5dc5daaca190277a062d946e63
Status affected
Version < f45ee5c074013a0fbfce77a5af5efddb01f5d4f4
Version f13c13a005127b5dc5daaca190277a062d946e63
Status affected
Version < eac030b22ea12cdfcbb2e941c21c03964403c63f
Version f13c13a005127b5dc5daaca190277a062d946e63
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 3.12
Status affected
Version < 3.12
Version 0
Status unaffected
Version <= 5.10.*
Version 5.10.195
Status unaffected
Version <= 5.15.*
Version 5.15.132
Status unaffected
Version <= 6.1.*
Version 6.1.53
Status unaffected
Version <= 6.4.*
Version 6.4.16
Status unaffected
Version <= 6.5.*
Version 6.5.3
Status unaffected
Version <= *
Version 6.6
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.04% 0.099
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.