CVE-2023-54267

Source
https://cve.org/CVERecord?id=CVE-2023-54267
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54267.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-54267
Downstream
Related
Published
2025-12-30T12:15:58.914Z
Modified
2026-03-28T17:44:09.276503304Z
Summary
powerpc/pseries: Rework lppaca_shared_proc() to avoid DEBUG_PREEMPT
Details

In the Linux kernel, the following vulnerability has been resolved:

powerpc/pseries: Rework lppacasharedproc() to avoid DEBUG_PREEMPT

lppacasharedproc() takes a pointer to the lppaca which is typically accessed through getlppaca(). With DEBUGPREEMPT enabled, this leads to checking if preemption is enabled, for example:

BUG: using smpprocessorid() in preemptible [00000000] code: grep/10693 caller is lparcfgdata+0x408/0x19a0 CPU: 4 PID: 10693 Comm: grep Not tainted 6.5.0-rc3 #2 Call Trace: dumpstacklvl+0x154/0x200 (unreliable) checkpreemptiondisabled+0x214/0x220 lparcfgdata+0x408/0x19a0 ...

This isn't actually a problem however, as it does not matter which lppaca is accessed, the shared proc state will be the same. vcpudispatchstatsprocfsinit() already works around this by disabling preemption, but the lparcfg code does not, erroring any time /proc/powerpc/lparcfg is accessed with DEBUGPREEMPT enabled.

Instead of disabling preemption on the caller side, rework lppacasharedproc() to not take a pointer and instead directly access the lppaca, bypassing any potential preemption checks.

[mpe: Rework to avoid needing a definition in paca.h and lppaca.h]

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54267.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
f13c13a005127b5dc5daaca190277a062d946e63
Fixed
953c54dfdc5d3eb7243ed902b50acb5ea1db4355
Fixed
2935443dc9c28499223d8c881474259e4b998f2a
Fixed
4c8568cf4c45b415854195c8832b557cdefba57a
Fixed
3c5e8e666794d7dde6d14ea846c6c04f2bb34900
Fixed
f45ee5c074013a0fbfce77a5af5efddb01f5d4f4
Fixed
eac030b22ea12cdfcbb2e941c21c03964403c63f

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54267.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
3.12.0
Fixed
5.10.195
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.132
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.53
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.4.16
Type
ECOSYSTEM
Events
Introduced
6.5.0
Fixed
6.5.3

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54267.json"