CVE-2023-54267
Preemption Bug in Linux powerpc lppaca Shared Proc Access
Publication date: 2025-12-30
Last updated on: 2025-12-30
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.5.0-rc3 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's powerpc/pseries code, specifically the lppaca_shared_proc() function. When DEBUG_PREEMPT is enabled, accessing the lppaca pointer through get_lppaca() causes preemption checks that can lead to errors or bugs, such as using smp_processor_id() in preemptible code. The issue arises because the lparcfg code does not disable preemption when accessing /proc/powerpc/lparcfg, causing errors. The fix reworks lppaca_shared_proc() to directly access the lppaca without taking a pointer, thus avoiding preemption checks and related errors.
How can this vulnerability impact me? :
This vulnerability can cause errors or bugs in the Linux kernel when DEBUG_PREEMPT is enabled and /proc/powerpc/lparcfg is accessed. Specifically, it can lead to kernel warnings or crashes due to improper preemption handling, potentially affecting system stability or reliability on affected PowerPC systems.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is resolved by reworking the lppaca_shared_proc() function in the Linux kernel to avoid DEBUG_PREEMPT issues. Immediate mitigation involves updating the Linux kernel to a version that includes this fix, as the problem occurs when accessing /proc/powerpc/lparcfg with DEBUG_PREEMPT enabled. Disabling DEBUG_PREEMPT or applying the kernel patch that reworks lppaca_shared_proc() are the recommended steps.