CVE-2023-54061
Exception Annotation Error in Linux x86 Kernel Causes Kernel Oops
Publication date: 2025-12-24
Last updated on: 2025-12-24
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :
If this vulnerability is triggered, it can cause the Linux kernel to produce a kernel oops (crash report) instead of properly handling a user memory access exception. This can lead to system instability or crashes, potentially affecting system reliability and availability. It may also complicate debugging because the kernel oops appears as a filesystem bug rather than the true cause related to exception annotation.
Can you explain this vulnerability to me?
This vulnerability is related to the Linux kernel's x86 architecture, specifically in the function clear_user_rep_good(). The issue was that the exception handling annotation pointed to the wrong instruction, causing the kernel's exception handler to fail to properly identify the faulting instruction when a user memory access caused an exception. Instead of returning an error (-EFAULT), the kernel would generate a kernel oops (a crash report), which appears as a filesystem bug rather than the actual exception annotation problem. The fix involved correcting the exception table annotation to point to the correct instruction that accesses user memory.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is fixed by correcting the exception table annotation placement in the Linux kernel's x86 memory clearing code. Immediate mitigation involves applying the patch that fixes clear_user_rep_good() exception handling or upgrading to a Linux kernel version that includes this fix. Since the vulnerable code was removed in mainline, updating to a kernel version containing commit d2c95f9d6802 or later is recommended.