CVE-2023-54095
Use-After-Free in Linux Kernel powerpc/iommu Notifier Handling Causes Kernel Crash
Publication date: 2025-12-24
Last updated on: 2025-12-24
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's powerpc/iommu code where a notifier structure (fail_iommu_bus_notifier) is incorrectly shared between PCI and VIO buses. Because the notifier_block is a linked list node, sharing it causes notifiers registered for one bus type to also be registered for the other. This leads to the pci_notify() function being called on VIO devices, which are not PCI devices, causing invalid memory access and a kernel crash detected by KASAN. The fix involves creating separate notifier_block structures for each bus type to prevent this cross-registration.
How can this vulnerability impact me? :
This vulnerability can cause kernel crashes due to invalid memory access when the system incorrectly treats VIO devices as PCI devices. This can lead to system instability, potential denial of service, and unpredictable behavior in affected Linux systems running on powerpc architectures with the iommu code path.
What immediate steps should I take to mitigate this vulnerability?
The immediate step to mitigate this vulnerability is to update the Linux kernel to a version where the fix has been applied. The fix involves creating separate notifier_block structs for each bus type to prevent the shared notifier issue causing bad memory access. Applying the official patch or upgrading to a fixed kernel version will resolve the issue.