CVE-2023-54232Linux vulnerability

7 documents6 sources
Severity
N/A
No vector
EPSS
0.0%
top 89.30%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 30

Description

In the Linux kernel, the following vulnerability has been resolved: m68k: Only force 030 bus error if PC not in exception table __get_kernel_nofault() does copy data in supervisor mode when forcing a task backtrace log through /proc/sysrq_trigger. This is expected cause a bus error exception on e.g. NULL pointer dereferencing when logging a kernel task has no workqueue associated. This bus error ought to be ignored. Our 030 bus error handler is ill equipped to deal with this: Whenever ssw in

Affected Packages4 packages

Linuxlinux/linux_kernel2.6.184.14.312+6
Debianlinux/linux_kernel< 5.10.178-1+3
CVEListV5linux/linuxf2325ecebc5b7988fd49968bd3a660fd1594dc841a6059f5ed57f48edfe7159404ff7d538d9d405b+8
debiandebian/linux< linux 6.1.25-1 (bookworm)

🔴Vulnerability Details

3
GHSA
GHSA-gvjr-wrwm-xp44: In the Linux kernel, the following vulnerability has been resolved: m68k: Only force 030 bus error if PC not in exception table __get_kernel_nofault2025-12-30
OSV
CVE-2023-54232: In the Linux kernel, the following vulnerability has been resolved: m68k: Only force 030 bus error if PC not in exception table __get_kernel_nofault()2025-12-30
OSV
m68k: Only force 030 bus error if PC not in exception table2025-12-30

📋Vendor Advisories

2
Red Hat
kernel: m68k: Only force 030 bus error if PC not in exception table2025-12-30
Debian
CVE-2023-54232: linux - In the Linux kernel, the following vulnerability has been resolved: m68k: Only ...2023

🕵️Threat Intelligence

1
Wiz
CVE-2023-54232 Impact, Exploitability, and Mitigation Steps | Wiz