CVE-2023-54232
Bus Error Handling Flaw in Linux m68k Kernel Causes Panic
Publication date: 2025-12-30
Last updated on: 2025-12-30
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's handling of bus errors on the m68k architecture, specifically the 030 bus error handler. When forcing a task backtrace log through /proc/sysrq_trigger, the kernel may cause a bus error exception (e.g., due to NULL pointer dereferencing) that should be ignored. However, the 030 bus error handler does not properly handle kernel mode data faults and always sends a SEGV signal or panics instead of checking the exception table. This leads to improper fault handling. The fix adds a check in the 030 bus error handler to call the page fault handler if the faulting program counter is in the exception table, aligning its behavior with other architectures.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to improperly handle certain bus errors during kernel task backtrace logging, potentially leading to unexpected SEGV signals or kernel panics. This may result in system instability or crashes when the kernel encounters specific fault conditions that should be safely ignored, affecting system reliability.