CVE-2023-54007
Race Condition in Linux vmci_host_poll() Causing Kernel Crash
Publication date: 2025-12-24
Last updated on: 2025-12-24
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a race condition in the Linux kernel's vmci_host_poll() function. It occurs because vmci_host_poll() reads the vmci_host_dev->context pointer before checking if it is properly initialized by reading vmci_host_dev->ct_type. Due to this non-atomic sequence, vmci_host_poll() may dereference an uninitialized or invalid pointer, causing a general protection fault (GPF). The issue arises from concurrent execution where one CPU reads the context while another CPU is initializing it, leading to a null pointer dereference and kernel crash.
How can this vulnerability impact me? :
This vulnerability can cause a general protection fault in the Linux kernel, leading to a kernel crash or system instability. Such crashes can result in denial of service, affecting system availability and potentially causing data loss or interruption of critical services running on the affected system.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version where the race condition in vmci_host_poll() has been fixed. This involves applying the patch that ensures vmci_host_poll() reads vmci_host_dev->ct_type before vmci_host_dev->context to avoid dereferencing uninitialized pointers and prevent the general protection fault.