CVE-2023-54160Use of a Non-reentrant Function in a Concurrent Context in Linux

Severity
4.4MEDIUM
No vector
EPSS
0.0%
top 89.30%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 24

Description

In the Linux kernel, the following vulnerability has been resolved: firmware: arm_sdei: Fix sleep from invalid context BUG Running a preempt-rt (v6.2-rc3-rt1) based kernel on an Ampere Altra triggers: BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:46 in_atomic(): 0, irqs_disabled(): 128, non_block: 0, pid: 24, name: cpuhp/0 preempt_count: 0, expected: 0 RCU nest depth: 0, expected: 0 3 locks held by cpuhp/0/24: #0: ffffda30217c70d0 (cpu_hotplug_lock){++++}-

Affected Packages4 packages

Linuxlinux/linux_kernel4.16.04.19.284+5
Debianlinux/linux_kernel< 5.10.191-1+3
CVEListV5linux/linuxf92b5462a2f22d13a75dc663f7b2fac16a3e61cb59842a9ba27d5390ae5bf3233a92cad3a26d495c+7
debiandebian/linux< linux 6.1.37-1 (bookworm)

🔴Vulnerability Details

3
OSV
CVE-2023-54160: In the Linux kernel, the following vulnerability has been resolved: firmware: arm_sdei: Fix sleep from invalid context BUG Running a preempt-rt (v62025-12-24
GHSA
GHSA-jfm8-wf93-6c4c: In the Linux kernel, the following vulnerability has been resolved: firmware: arm_sdei: Fix sleep from invalid context BUG Running a preempt-rt (v62025-12-24
OSV
firmware: arm_sdei: Fix sleep from invalid context BUG2025-12-24

📋Vendor Advisories

2
Red Hat
kernel: firmware: arm_sdei: Fix sleep from invalid context BUG2025-12-24
Debian
CVE-2023-54160: linux - In the Linux kernel, the following vulnerability has been resolved: firmware: a...2023

🕵️Threat Intelligence

1
Wiz
CVE-2023-54160 Impact, Exploitability, and Mitigation Steps | Wiz