CVE-2023-52740

Severity CVSS v4.0:
Pending analysis
Type:
CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Publication date:
21/05/2024
Last modified:
23/09/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> powerpc/64s/interrupt: Fix interrupt exit race with security mitigation switch<br /> <br /> The RFI and STF security mitigation options can flip the<br /> interrupt_exit_not_reentrant static branch condition concurrently with<br /> the interrupt exit code which tests that branch.<br /> <br /> Interrupt exit tests this condition to set MSR[EE|RI] for exit, then<br /> again in the case a soft-masked interrupt is found pending, to recover<br /> the MSR so the interrupt can be replayed before attempting to exit<br /> again. If the condition changes between these two tests, the MSR and irq<br /> soft-mask state will become corrupted, leading to warnings and possible<br /> crashes. For example, if the branch is initially true then false,<br /> MSR[EE] will be 0 but PACA_IRQ_HARD_DIS clear and EE may not get<br /> enabled, leading to warnings in irq_64.c.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.14 (including) 5.15.94 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.12 (excluding)
cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc7:*:*:*:*:*:*