CVE-2023-54160
Invalid Sleep Context Bug in Linux Kernel arm_sdei Firmware
Publication date: 2025-12-24
Last updated on: 2025-12-24
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 5.19.0-rc3-rt5 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's arm_sdei firmware component where a sleeping function is called from an invalid context, specifically during CPU hotplug operations with interrupts disabled. This causes a BUG due to improper handling of preemption and locking in the kernel's real-time (preempt-rt) environment. The issue arises because certain callbacks are executed too early with interrupts disabled, leading to invalid sleep calls. The fix involves moving these callbacks to a later stage where preemption is enabled, preventing the invalid context sleep calls.
How can this vulnerability impact me? :
This vulnerability can cause kernel crashes or instability when running a preempt-rt based Linux kernel on certain hardware (e.g., Ampere Altra). The invalid sleep calls from an improper context can trigger BUGs, potentially leading to system hangs or failures during CPU hotplug operations, which can affect system reliability and uptime.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by observing kernel logs for the specific BUG message indicating a sleeping function called from invalid context, such as: "BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:46". You can check the kernel logs using commands like 'dmesg | grep "BUG: sleeping function called from invalid context"' or 'journalctl -k | grep "BUG: sleeping function called from invalid context"'.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version where this issue is fixed, as the vulnerability is resolved by changes in the arm_sdei firmware code to avoid sleeping from invalid context. Until then, monitoring for the BUG messages and avoiding running vulnerable kernel versions on affected hardware (e.g., Ampere Altra with preempt-rt kernel) is recommended.