Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

CVE-2023-54278

Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
30/12/2025
Última modificación:
30/12/2025

Descripción

*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> s390/vmem: split pages when debug pagealloc is enabled<br /> <br /> Since commit bb1520d581a3 ("s390/mm: start kernel with DAT enabled")<br /> the kernel crashes early during boot when debug pagealloc is enabled:<br /> <br /> mem auto-init: stack:off, heap alloc:off, heap free:off<br /> addressing exception: 0005 ilc:2 [#1] SMP DEBUG_PAGEALLOC<br /> Modules linked in:<br /> CPU: 0 PID: 0 Comm: swapper Not tainted 6.5.0-rc3-09759-gc5666c912155 #630<br /> [..]<br /> Krnl Code: 00000000001325f6: ec5600248064 cgrj %r5,%r6,8,000000000013263e<br /> 00000000001325fc: eb880002000c srlg %r8,%r8,2<br /> #0000000000132602: b2210051 ipte %r5,%r1,%r0,0<br /> &gt;0000000000132606: b90400d1 lgr %r13,%r1<br /> 000000000013260a: 41605008 la %r6,8(%r5)<br /> 000000000013260e: a7db1000 aghi %r13,4096<br /> 0000000000132612: b221006d ipte %r6,%r13,%r0,0<br /> 0000000000132616: e3d0d0000171 lay %r13,4096(%r13)<br /> <br /> Call Trace:<br /> __kernel_map_pages+0x14e/0x320<br /> __free_pages_ok+0x23a/0x5a8)<br /> free_low_memory_core_early+0x214/0x2c8<br /> memblock_free_all+0x28/0x58<br /> mem_init+0xb6/0x228<br /> mm_core_init+0xb6/0x3b0<br /> start_kernel+0x1d2/0x5a8<br /> startup_continue+0x36/0x40<br /> Kernel panic - not syncing: Fatal exception: panic_on_oops<br /> <br /> This is caused by using large mappings on machines with EDAT1/EDAT2. Add<br /> the code to split the mappings into 4k pages if debug pagealloc is enabled<br /> by CONFIG_DEBUG_PAGEALLOC_ENABLE_DEFAULT or the debug_pagealloc kernel<br /> command line option.

Impacto