CVE-2023-54095 (GCVE-0-2023-54095)
Vulnerability from cvelistv5
Published
2025-12-24 13:06
Modified
2025-12-24 13:06
Severity ?
VLAI Severity ?
EPSS score ?
Summary
In the Linux kernel, the following vulnerability has been resolved:
powerpc/iommu: Fix notifiers being shared by PCI and VIO buses
fail_iommu_setup() registers the fail_iommu_bus_notifier struct to both
PCI and VIO buses. struct notifier_block is a linked list node, so this
causes any notifiers later registered to either bus type to also be
registered to the other since they share the same node.
This causes issues in (at least) the vgaarb code, which registers a
notifier for PCI buses. pci_notify() ends up being called on a vio
device, converted with to_pci_dev() even though it's not a PCI device,
and finally makes a bad access in vga_arbiter_add_pci_device() as
discovered with KASAN:
BUG: KASAN: slab-out-of-bounds in vga_arbiter_add_pci_device+0x60/0xe00
Read of size 4 at addr c000000264c26fdc by task swapper/0/1
Call Trace:
dump_stack_lvl+0x1bc/0x2b8 (unreliable)
print_report+0x3f4/0xc60
kasan_report+0x244/0x698
__asan_load4+0xe8/0x250
vga_arbiter_add_pci_device+0x60/0xe00
pci_notify+0x88/0x444
notifier_call_chain+0x104/0x320
blocking_notifier_call_chain+0xa0/0x140
device_add+0xac8/0x1d30
device_register+0x58/0x80
vio_register_device_node+0x9ac/0xce0
vio_bus_scan_register_devices+0xc4/0x13c
__machine_initcall_pseries_vio_device_init+0x94/0xf0
do_one_initcall+0x12c/0xaa8
kernel_init_freeable+0xa48/0xba8
kernel_init+0x64/0x400
ret_from_kernel_thread+0x5c/0x64
Fix this by creating separate notifier_block structs for each bus type.
[mpe: Add #ifdef to fix CONFIG_IBMVIO=n build]
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Linux | Linux |
Version: d6b9a81b2a45786384f5bd3516bd6ddfb4b772c6 Version: d6b9a81b2a45786384f5bd3516bd6ddfb4b772c6 Version: d6b9a81b2a45786384f5bd3516bd6ddfb4b772c6 Version: d6b9a81b2a45786384f5bd3516bd6ddfb4b772c6 Version: d6b9a81b2a45786384f5bd3516bd6ddfb4b772c6 Version: d6b9a81b2a45786384f5bd3516bd6ddfb4b772c6 Version: d6b9a81b2a45786384f5bd3516bd6ddfb4b772c6 Version: d6b9a81b2a45786384f5bd3516bd6ddfb4b772c6 Version: d6b9a81b2a45786384f5bd3516bd6ddfb4b772c6 |
||
{
"containers": {
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"arch/powerpc/kernel/iommu.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "dc0d107e624ca96aef6dd8722eb33ba3a6d157b0",
"status": "affected",
"version": "d6b9a81b2a45786384f5bd3516bd6ddfb4b772c6",
"versionType": "git"
},
{
"lessThan": "075a4dcdbc9a5ea793cb8ec8b78a6c0b7636fd52",
"status": "affected",
"version": "d6b9a81b2a45786384f5bd3516bd6ddfb4b772c6",
"versionType": "git"
},
{
"lessThan": "65bf8a196ba25cf65a858b5bb8de80f0aad76691",
"status": "affected",
"version": "d6b9a81b2a45786384f5bd3516bd6ddfb4b772c6",
"versionType": "git"
},
{
"lessThan": "f08944e3c6962b00827de7263a9e20688e79ad84",
"status": "affected",
"version": "d6b9a81b2a45786384f5bd3516bd6ddfb4b772c6",
"versionType": "git"
},
{
"lessThan": "a9ddbfed53465bc7c411231db32a488066c0c1be",
"status": "affected",
"version": "d6b9a81b2a45786384f5bd3516bd6ddfb4b772c6",
"versionType": "git"
},
{
"lessThan": "f17d5efaafba3d5f02f0373f7c5f44711d676f3e",
"status": "affected",
"version": "d6b9a81b2a45786384f5bd3516bd6ddfb4b772c6",
"versionType": "git"
},
{
"lessThan": "c46af58588253e5e4063bb5ddc78cd12fdf9e55d",
"status": "affected",
"version": "d6b9a81b2a45786384f5bd3516bd6ddfb4b772c6",
"versionType": "git"
},
{
"lessThan": "6670c65bf863cd0d44ca24d4c10ef6755b8d9529",
"status": "affected",
"version": "d6b9a81b2a45786384f5bd3516bd6ddfb4b772c6",
"versionType": "git"
},
{
"lessThan": "c37b6908f7b2bd24dcaaf14a180e28c9132b9c58",
"status": "affected",
"version": "d6b9a81b2a45786384f5bd3516bd6ddfb4b772c6",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"arch/powerpc/kernel/iommu.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "3.6"
},
{
"lessThan": "3.6",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "4.14.*",
"status": "unaffected",
"version": "4.14.326",
"versionType": "semver"
},
{
"lessThanOrEqual": "4.19.*",
"status": "unaffected",
"version": "4.19.295",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.4.*",
"status": "unaffected",
"version": "5.4.257",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"version": "5.10.195",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.15.*",
"status": "unaffected",
"version": "5.15.132",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.1.*",
"status": "unaffected",
"version": "6.1.53",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.4.*",
"status": "unaffected",
"version": "6.4.16",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.5.*",
"status": "unaffected",
"version": "6.5.3",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "6.6",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.14.326",
"versionStartIncluding": "3.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.19.295",
"versionStartIncluding": "3.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.4.257",
"versionStartIncluding": "3.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.10.195",
"versionStartIncluding": "3.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.15.132",
"versionStartIncluding": "3.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.1.53",
"versionStartIncluding": "3.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.4.16",
"versionStartIncluding": "3.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.5.3",
"versionStartIncluding": "3.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.6",
"versionStartIncluding": "3.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/iommu: Fix notifiers being shared by PCI and VIO buses\n\nfail_iommu_setup() registers the fail_iommu_bus_notifier struct to both\nPCI and VIO buses. struct notifier_block is a linked list node, so this\ncauses any notifiers later registered to either bus type to also be\nregistered to the other since they share the same node.\n\nThis causes issues in (at least) the vgaarb code, which registers a\nnotifier for PCI buses. pci_notify() ends up being called on a vio\ndevice, converted with to_pci_dev() even though it\u0027s not a PCI device,\nand finally makes a bad access in vga_arbiter_add_pci_device() as\ndiscovered with KASAN:\n\n BUG: KASAN: slab-out-of-bounds in vga_arbiter_add_pci_device+0x60/0xe00\n Read of size 4 at addr c000000264c26fdc by task swapper/0/1\n\n Call Trace:\n dump_stack_lvl+0x1bc/0x2b8 (unreliable)\n print_report+0x3f4/0xc60\n kasan_report+0x244/0x698\n __asan_load4+0xe8/0x250\n vga_arbiter_add_pci_device+0x60/0xe00\n pci_notify+0x88/0x444\n notifier_call_chain+0x104/0x320\n blocking_notifier_call_chain+0xa0/0x140\n device_add+0xac8/0x1d30\n device_register+0x58/0x80\n vio_register_device_node+0x9ac/0xce0\n vio_bus_scan_register_devices+0xc4/0x13c\n __machine_initcall_pseries_vio_device_init+0x94/0xf0\n do_one_initcall+0x12c/0xaa8\n kernel_init_freeable+0xa48/0xba8\n kernel_init+0x64/0x400\n ret_from_kernel_thread+0x5c/0x64\n\nFix this by creating separate notifier_block structs for each bus type.\n\n[mpe: Add #ifdef to fix CONFIG_IBMVIO=n build]"
}
],
"providerMetadata": {
"dateUpdated": "2025-12-24T13:06:23.157Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/dc0d107e624ca96aef6dd8722eb33ba3a6d157b0"
},
{
"url": "https://git.kernel.org/stable/c/075a4dcdbc9a5ea793cb8ec8b78a6c0b7636fd52"
},
{
"url": "https://git.kernel.org/stable/c/65bf8a196ba25cf65a858b5bb8de80f0aad76691"
},
{
"url": "https://git.kernel.org/stable/c/f08944e3c6962b00827de7263a9e20688e79ad84"
},
{
"url": "https://git.kernel.org/stable/c/a9ddbfed53465bc7c411231db32a488066c0c1be"
},
{
"url": "https://git.kernel.org/stable/c/f17d5efaafba3d5f02f0373f7c5f44711d676f3e"
},
{
"url": "https://git.kernel.org/stable/c/c46af58588253e5e4063bb5ddc78cd12fdf9e55d"
},
{
"url": "https://git.kernel.org/stable/c/6670c65bf863cd0d44ca24d4c10ef6755b8d9529"
},
{
"url": "https://git.kernel.org/stable/c/c37b6908f7b2bd24dcaaf14a180e28c9132b9c58"
}
],
"title": "powerpc/iommu: Fix notifiers being shared by PCI and VIO buses",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2023-54095",
"datePublished": "2025-12-24T13:06:23.157Z",
"dateReserved": "2025-12-24T13:02:52.516Z",
"dateUpdated": "2025-12-24T13:06:23.157Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2023-54095\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-12-24T13:16:11.383\",\"lastModified\":\"2025-12-24T13:16:11.383\",\"vulnStatus\":\"Received\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\npowerpc/iommu: Fix notifiers being shared by PCI and VIO buses\\n\\nfail_iommu_setup() registers the fail_iommu_bus_notifier struct to both\\nPCI and VIO buses. struct notifier_block is a linked list node, so this\\ncauses any notifiers later registered to either bus type to also be\\nregistered to the other since they share the same node.\\n\\nThis causes issues in (at least) the vgaarb code, which registers a\\nnotifier for PCI buses. pci_notify() ends up being called on a vio\\ndevice, converted with to_pci_dev() even though it\u0027s not a PCI device,\\nand finally makes a bad access in vga_arbiter_add_pci_device() as\\ndiscovered with KASAN:\\n\\n BUG: KASAN: slab-out-of-bounds in vga_arbiter_add_pci_device+0x60/0xe00\\n Read of size 4 at addr c000000264c26fdc by task swapper/0/1\\n\\n Call Trace:\\n dump_stack_lvl+0x1bc/0x2b8 (unreliable)\\n print_report+0x3f4/0xc60\\n kasan_report+0x244/0x698\\n __asan_load4+0xe8/0x250\\n vga_arbiter_add_pci_device+0x60/0xe00\\n pci_notify+0x88/0x444\\n notifier_call_chain+0x104/0x320\\n blocking_notifier_call_chain+0xa0/0x140\\n device_add+0xac8/0x1d30\\n device_register+0x58/0x80\\n vio_register_device_node+0x9ac/0xce0\\n vio_bus_scan_register_devices+0xc4/0x13c\\n __machine_initcall_pseries_vio_device_init+0x94/0xf0\\n do_one_initcall+0x12c/0xaa8\\n kernel_init_freeable+0xa48/0xba8\\n kernel_init+0x64/0x400\\n ret_from_kernel_thread+0x5c/0x64\\n\\nFix this by creating separate notifier_block structs for each bus type.\\n\\n[mpe: Add #ifdef to fix CONFIG_IBMVIO=n build]\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/075a4dcdbc9a5ea793cb8ec8b78a6c0b7636fd52\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/65bf8a196ba25cf65a858b5bb8de80f0aad76691\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/6670c65bf863cd0d44ca24d4c10ef6755b8d9529\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/a9ddbfed53465bc7c411231db32a488066c0c1be\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/c37b6908f7b2bd24dcaaf14a180e28c9132b9c58\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/c46af58588253e5e4063bb5ddc78cd12fdf9e55d\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/dc0d107e624ca96aef6dd8722eb33ba3a6d157b0\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/f08944e3c6962b00827de7263a9e20688e79ad84\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/f17d5efaafba3d5f02f0373f7c5f44711d676f3e\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…