CVE-2023-54167Linux vulnerability

7 documents6 sources
Severity
6.9MEDIUM
No vector
EPSS
0.0%
top 93.24%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 30

Description

In the Linux kernel, the following vulnerability has been resolved: m68k: mm: Move initrd phys_to_virt handling after paging_init() When booting with an initial ramdisk on platforms where physical memory does not start at address zero (e.g. on Amiga): initrd: 0ef0602c - 0f800000 Zone ranges: DMA [mem 0x0000000008000000-0x000000f7ffffffff] Normal empty Movable zone start for each node Early memory node ranges node 0: [mem 0x0000000008000000-0x000000000f7fffff] Initmem setup node 0 [mem 0x00000

Affected Packages4 packages

Linuxlinux/linux_kernel5.17.06.1.20+1
Debianlinux/linux_kernel< 6.1.20-1+2
CVEListV5linux/linux376e3fdecb0dcae216c0ac559cff066f460bf47bceb089e2337f810d3594d310953d9af4783f660a+3
debiandebian/linux< linux 6.1.20-1 (bookworm)

🔴Vulnerability Details

3
GHSA
GHSA-m7mj-mw9m-293g: In the Linux kernel, the following vulnerability has been resolved: m68k: mm: Move initrd phys_to_virt handling after paging_init() When booting wit2025-12-30
OSV
CVE-2023-54167: In the Linux kernel, the following vulnerability has been resolved: m68k: mm: Move initrd phys_to_virt handling after paging_init() When booting with2025-12-30
OSV
m68k: mm: Move initrd phys_to_virt handling after paging_init()2025-12-30

📋Vendor Advisories

2
Red Hat
kernel: m68k: mm: Move initrd phys_to_virt handling after paging_init()2025-12-30
Debian
CVE-2023-54167: linux - In the Linux kernel, the following vulnerability has been resolved: m68k: mm: M...2023

🕵️Threat Intelligence

1
Wiz
CVE-2023-54167 Impact, Exploitability, and Mitigation Steps | Wiz