CVE-2023-54322Expected Behavior Violation in Linux

Severity
3.3LOW
No vector
EPSS
0.0%
top 92.73%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 30

Description

In the Linux kernel, the following vulnerability has been resolved: arm64: set __exception_irq_entry with __irq_entry as a default filter_irq_stacks() is supposed to cut entries which are related irq entries from its call stack. And in_irqentry_text() which is called by filter_irq_stacks() uses __irqentry_text_start/end symbol to find irq entries in callstack. But it doesn't work correctly as without "CONFIG_FUNCTION_GRAPH_TRACER", arm64 kernel doesn't include gic_handle_irq which is entry po

Affected Packages4 packages

Linuxlinux/linux_kernel4.3.05.10.188+2
Debianlinux/linux_kernel< 5.10.191-1+2
CVEListV5linux/linux9a5ad7d0e3e1c6c0c11df89fbc5376f8aaf7a90fc71d6934c6ac40a97146a410e0320768c7b1bb3c+4
debiandebian/linux< linux 5.10.191-1 (bullseye)

🔴Vulnerability Details

3
GHSA
GHSA-3rp4-j8x5-r3q5: In the Linux kernel, the following vulnerability has been resolved: arm64: set __exception_irq_entry with __irq_entry as a default filter_irq_stacks2025-12-30
OSV
arm64: set __exception_irq_entry with __irq_entry as a default2025-12-30
OSV
CVE-2023-54322: In the Linux kernel, the following vulnerability has been resolved: arm64: set __exception_irq_entry with __irq_entry as a default filter_irq_stacks()2025-12-30

📋Vendor Advisories

2
Red Hat
kernel: arm64: set __exception_irq_entry with __irq_entry as a default2025-12-30
Debian
CVE-2023-54322: linux - In the Linux kernel, the following vulnerability has been resolved: arm64: set ...2023

🕵️Threat Intelligence

1
Wiz
CVE-2023-54322 Impact, Exploitability, and Mitigation Steps | Wiz