-
CVE-2023-54267
- EPSS 0.04%
- Veröffentlicht 30.12.2025 12:15:58
- Zuletzt bearbeitet 31.12.2025 20:42:43
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
In the Linux kernel, the following vulnerability has been resolved:
powerpc/pseries: Rework lppaca_shared_proc() to avoid DEBUG_PREEMPT
lppaca_shared_proc() takes a pointer to the lppaca which is typically
accessed through get_lppaca(). With DEBUG_PREEMPT enabled, this leads
to checking if preemption is enabled, for example:
BUG: using smp_processor_id() in preemptible [00000000] code: grep/10693
caller is lparcfg_data+0x408/0x19a0
CPU: 4 PID: 10693 Comm: grep Not tainted 6.5.0-rc3 #2
Call Trace:
dump_stack_lvl+0x154/0x200 (unreliable)
check_preemption_disabled+0x214/0x220
lparcfg_data+0x408/0x19a0
...
This isn't actually a problem however, as it does not matter which
lppaca is accessed, the shared proc state will be the same.
vcpudispatch_stats_procfs_init() already works around this by disabling
preemption, but the lparcfg code does not, erroring any time
/proc/powerpc/lparcfg is accessed with DEBUG_PREEMPT enabled.
Instead of disabling preemption on the caller side, rework
lppaca_shared_proc() to not take a pointer and instead directly access
the lppaca, bypassing any potential preemption checks.
[mpe: Rework to avoid needing a definition in paca.h and lppaca.h]Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
953c54dfdc5d3eb7243ed902b50acb5ea1db4355
Version
f13c13a005127b5dc5daaca190277a062d946e63
Status
affected
Version <
2935443dc9c28499223d8c881474259e4b998f2a
Version
f13c13a005127b5dc5daaca190277a062d946e63
Status
affected
Version <
4c8568cf4c45b415854195c8832b557cdefba57a
Version
f13c13a005127b5dc5daaca190277a062d946e63
Status
affected
Version <
3c5e8e666794d7dde6d14ea846c6c04f2bb34900
Version
f13c13a005127b5dc5daaca190277a062d946e63
Status
affected
Version <
f45ee5c074013a0fbfce77a5af5efddb01f5d4f4
Version
f13c13a005127b5dc5daaca190277a062d946e63
Status
affected
Version <
eac030b22ea12cdfcbb2e941c21c03964403c63f
Version
f13c13a005127b5dc5daaca190277a062d946e63
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
3.12
Status
affected
Version <
3.12
Version
0
Status
unaffected
Version <=
5.10.*
Version
5.10.195
Status
unaffected
Version <=
5.15.*
Version
5.15.132
Status
unaffected
Version <=
6.1.*
Version
6.1.53
Status
unaffected
Version <=
6.4.*
Version
6.4.16
Status
unaffected
Version <=
6.5.*
Version
6.5.3
Status
unaffected
Version <=
*
Version
6.6
Status
unaffected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.04% | 0.099 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|