CVE-2023-54267Use of a Non-reentrant Function in a Concurrent Context in Linux

Severity
2.5LOW
No vector
EPSS
0.0%
top 89.30%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 30

Description

In the Linux kernel, the following vulnerability has been resolved: powerpc/pseries: Rework lppaca_shared_proc() to avoid DEBUG_PREEMPT lppaca_shared_proc() takes a pointer to the lppaca which is typically accessed through get_lppaca(). With DEBUG_PREEMPT enabled, this leads to checking if preemption is enabled, for example: BUG: using smp_processor_id() in preemptible [00000000] code: grep/10693 caller is lparcfg_data+0x408/0x19a0 CPU: 4 PID: 10693 Comm: grep Not tainted 6.5.0-rc3 #2 Call Tr

Affected Packages4 packages

Linuxlinux/linux_kernel3.12.05.10.195+4
Debianlinux/linux_kernel< 5.10.197-1+3
CVEListV5linux/linuxf13c13a005127b5dc5daaca190277a062d946e63953c54dfdc5d3eb7243ed902b50acb5ea1db4355+6
debiandebian/linux< linux 6.1.55-1 (bookworm)

🔴Vulnerability Details

3
GHSA
GHSA-r3v9-vm52-w2px: In the Linux kernel, the following vulnerability has been resolved: powerpc/pseries: Rework lppaca_shared_proc() to avoid DEBUG_PREEMPT lppaca_share2025-12-30
OSV
powerpc/pseries: Rework lppaca_shared_proc() to avoid DEBUG_PREEMPT2025-12-30
OSV
CVE-2023-54267: In the Linux kernel, the following vulnerability has been resolved: powerpc/pseries: Rework lppaca_shared_proc() to avoid DEBUG_PREEMPT lppaca_shared_2025-12-30

📋Vendor Advisories

2
Red Hat
kernel: powerpc/pseries: Rework lppaca_shared_proc() to avoid DEBUG_PREEMPT2025-12-30
Debian
CVE-2023-54267: linux - In the Linux kernel, the following vulnerability has been resolved: powerpc/pse...2023

🕵️Threat Intelligence

1
Wiz
CVE-2023-54267 Impact, Exploitability, and Mitigation Steps | Wiz