CVE-2023-54322 — Expected Behavior Violation in Linux
Severity
3.3LOW
No vectorEPSS
0.0%
top 92.73%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 30
Description
In the Linux kernel, the following vulnerability has been resolved:
arm64: set __exception_irq_entry with __irq_entry as a default
filter_irq_stacks() is supposed to cut entries which are related irq entries
from its call stack.
And in_irqentry_text() which is called by filter_irq_stacks()
uses __irqentry_text_start/end symbol to find irq entries in callstack.
But it doesn't work correctly as without "CONFIG_FUNCTION_GRAPH_TRACER",
arm64 kernel doesn't include gic_handle_irq which is entry po…
Affected Packages4 packages
▶CVEListV5linux/linux9a5ad7d0e3e1c6c0c11df89fbc5376f8aaf7a90f — c71d6934c6ac40a97146a410e0320768c7b1bb3c+4
🔴Vulnerability Details
3GHSA▶
GHSA-3rp4-j8x5-r3q5: In the Linux kernel, the following vulnerability has been resolved:
arm64: set __exception_irq_entry with __irq_entry as a default
filter_irq_stacks↗2025-12-30
OSV▶
CVE-2023-54322: In the Linux kernel, the following vulnerability has been resolved: arm64: set __exception_irq_entry with __irq_entry as a default filter_irq_stacks()↗2025-12-30