CVE-2023-54278
Kernel Panic in Linux s390 vmem Due to Debug Pagealloc Overflow
Publication date: 2025-12-30
Last updated on: 2025-12-30
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | kernel | * |
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel on s390 architecture when debug pagealloc is enabled. The kernel crashes early during boot due to improper handling of large memory mappings on machines with EDAT1/EDAT2. The issue is caused by not splitting large memory mappings into 4k pages, which leads to a fatal exception and kernel panic. The fix involves splitting these large mappings into 4k pages when debug pagealloc is enabled.
How can this vulnerability impact me? :
If you run the Linux kernel on s390 architecture with debug pagealloc enabled, this vulnerability can cause your system to crash early during boot, resulting in a kernel panic and preventing the system from starting properly.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, ensure that debug pagealloc is disabled or not enabled by default. Avoid enabling debug pagealloc via the kernel command line option or the CONFIG_DEBUG_PAGEALLOC_ENABLE_DEFAULT setting. Additionally, update the Linux kernel to a version that includes the fix which splits large memory mappings into 4k pages when debug pagealloc is enabled.