CVE-2023-54160 — Use of a Non-reentrant Function in a Concurrent Context in Linux
Severity
4.4MEDIUM
No vectorEPSS
0.0%
top 89.30%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 24
Description
In the Linux kernel, the following vulnerability has been resolved:
firmware: arm_sdei: Fix sleep from invalid context BUG
Running a preempt-rt (v6.2-rc3-rt1) based kernel on an Ampere Altra
triggers:
BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:46
in_atomic(): 0, irqs_disabled(): 128, non_block: 0, pid: 24, name: cpuhp/0
preempt_count: 0, expected: 0
RCU nest depth: 0, expected: 0
3 locks held by cpuhp/0/24:
#0: ffffda30217c70d0 (cpu_hotplug_lock){++++}-…
Affected Packages4 packages
▶CVEListV5linux/linuxf92b5462a2f22d13a75dc663f7b2fac16a3e61cb — 59842a9ba27d5390ae5bf3233a92cad3a26d495c+7
🔴Vulnerability Details
3OSV▶
CVE-2023-54160: In the Linux kernel, the following vulnerability has been resolved: firmware: arm_sdei: Fix sleep from invalid context BUG Running a preempt-rt (v6↗2025-12-24
GHSA▶
GHSA-jfm8-wf93-6c4c: In the Linux kernel, the following vulnerability has been resolved:
firmware: arm_sdei: Fix sleep from invalid context BUG
Running a preempt-rt (v6↗2025-12-24