In the Linux kernel, the following vulnerability has been resolved:
powerpc/64s/interrupt: Fix interrupt exit race with security mitigation
switch The RFI and STF security mitigation options can flip the
interrupt_exit_not_reentrant static branch condition concurrently with the
interrupt exit code which tests that branch. Interrupt exit tests this
condition to set MSR[EE|RI] for exit, then again in the case a soft-masked
interrupt is found pending, to recover the MSR so the interrupt can be
replayed before attempting to exit again. If the condition changes between
these two tests, the MSR and irq soft-mask state will become corrupted,
leading to warnings and possible crashes. For example, if the branch is
initially true then false, MSR[EE] will be 0 but PACA_IRQ_HARD_DIS clear
and EE may not get enabled, leading to warnings in irq_64.c.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 22.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws-5.15 | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-azure | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure-5.15 | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-azure-fde | < 5.15.0-1038.45.1 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure-fde-5.15 | < 5.15.0-1038.45~20.04.1.1 | UNKNOWN |
ubuntu | 22.04 | noarch | linux-gcp | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-gcp-5.15 | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-gke | < any | UNKNOWN |
git.kernel.org/linus/2ea31e2e62bbc4d11c411eeb36f1b02841dbcab1 (6.2-rc8)
git.kernel.org/stable/c/2ea31e2e62bbc4d11c411eeb36f1b02841dbcab1
git.kernel.org/stable/c/6f097c24815e67909a1fcc2c605586d02babd673
git.kernel.org/stable/c/86f7e423933608d536015a0f2eb9e0338c1227e0
launchpad.net/bugs/cve/CVE-2023-52740
nvd.nist.gov/vuln/detail/CVE-2023-52740
security-tracker.debian.org/tracker/CVE-2023-52740
www.cve.org/CVERecord?id=CVE-2023-52740