CVE-2023-54225
BaseFortify
Publication date: 2025-12-30
Last updated on: 2025-12-31
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's handling of GSI channel transactions in the IPA (IP Accelerator) component. A change replaced spinlock-protected linked lists with ring buffer indexes for managing transactions. This led to occasional transaction reference count underflows during modem shutdown, caused by unused transactions being committed when they should not be. Specifically, when hashing is not supported, hashed table memory should not be zeroed, but the code did not prevent this, resulting in unused transactions and reference count underflows. The fix prevents clearing hashed tables when hashing is unsupported, avoiding these underflows.
How can this vulnerability impact me? :
The vulnerability can cause transaction reference count underflows during modem shutdown in the Linux kernel's IPA component. This may lead to improper handling of modem shutdown cleanup, potentially causing system instability or unexpected behavior related to memory management in the IPA subsystem. However, the description does not specify direct security impacts such as data leakage or privilege escalation.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is resolved by preventing attempts to clear hashed tables when hashing is not supported, which avoids reference count underflows. Immediate mitigation would involve updating the Linux kernel to a version that includes this fix. There are no other specific mitigation steps or workarounds described.