CVE-2023-53986
Kernel Panic Due to RAC Flush Vulnerability in BCM6358 MIPS
Publication date: 2025-12-24
Last updated on: 2025-12-24
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| broadcom | bc6358 | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel on the Broadcom BCM6358 platform. It is caused by the bootloader (CFE) not properly initializing the Read-ahead cache (RAC) on the second thread (TP1). When the kernel attempts to flush the RAC during boot with EHCI/OHCI USB controllers, it causes kernel panics due to corrupted instruction streams. The fix disables RAC flush for TP1 to prevent these panics.
How can this vulnerability impact me? :
If affected, this vulnerability can cause kernel panics during system boot on devices using the Broadcom BCM6358 chipset with EHCI/OHCI USB controllers. This results in system instability and reboot loops, preventing the system from booting properly.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by observing kernel panic messages during boot on BCM6358 devices using EHCI/OHCI USB controllers. Specifically, look for kernel panic logs similar to the provided trace showing 'Reserved instruction in kernel code' and messages related to 'setup_sigcontext' and 'Kernel panic - not syncing: Fatal exception'. Checking system logs (e.g., dmesg) for these panic traces can help detect the issue.
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation is to disable the RAC (Read-ahead cache) flush for the second thread (TP1) on BCM6358 devices, as the bootloader does not initialize the RAC properly on TP1. Avoid flushing the RAC to prevent kernel panics and instruction stream corruption. Applying the Linux kernel update that includes this fix is recommended.