CVE-2023-54232

Source
https://cve.org/CVERecord?id=CVE-2023-54232
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-54232.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-54232
Downstream
Published
2025-12-30T12:11:23.565Z
Modified
2026-04-02T09:45:41.965547Z
Summary
m68k: Only force 030 bus error if PC not in exception table
Details

In the Linux kernel, the following vulnerability has been resolved:

m68k: Only force 030 bus error if PC not in exception table

_getkernelnofault() does copy data in supervisor mode when forcing a task backtrace log through /proc/sysrqtrigger. This is expected cause a bus error exception on e.g. NULL pointer dereferencing when logging a kernel task has no workqueue associated. This bus error ought to be ignored.

Our 030 bus error handler is ill equipped to deal with this:

Whenever ssw indicates a kernel mode access on a data fault, we don't even attempt to handle the fault and instead always send a SEGV signal (or panic). As a result, the check for exception handling at the fault PC (buried in sendsigfault() which gets called from dopagefault() eventually) is never used.

In contrast, both 040 and 060 access error handlers do not care whether a fault happened on supervisor mode access, and will call dopagefault() on those, ultimately honoring the exception table.

Add a check in buserror030 to call dopage_fault() in case we do have an entry for the fault PC in our exception table.

I had attempted a fix for this earlier in 2019 that did rely on testing pagefault_disabled() (see link below) to achieve the same thing, but this patch should be more generic.

Tested on 030 Atari Falcon.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54232.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
f2325ecebc5b7988fd49968bd3a660fd1594dc84
Fixed
1a6059f5ed57f48edfe7159404ff7d538d9d405b
Fixed
f55cb52ec98b22125f5bda36391edb8894f7e8cf
Fixed
2100e374251a8fc00cce1916cfc50f3cb652cbe3
Fixed
df1da53a7e98f0b2a0eb2241c154f148f2f2c1d8
Fixed
8bf8d5dade4c5e1d8a2386f29253ed28b5d87735
Fixed
54fa25ffab2b700df5abd58c136d64a912c53953
Fixed
ec15405b80fc15ffc87a23d01378ae061c1aba07
Fixed
e36a82bebbf7da814530d5a179bef9df5934b717

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-54232.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.6.18
Fixed
4.14.312
Type
ECOSYSTEM
Events
Introduced
4.15.0
Fixed
4.19.280
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.240
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.177
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.105
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.22
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.2.9

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-54232.json"