#VU106205 Improper locking in Linux kernel - CVE-2023-53031
Published: March 27, 2025 / Updated: May 11, 2025
Linux kernel
Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the DEFINE_MUTEX(), __MUTEX_INITIALIZER(), ppc_nest_imc_cpu_offline(), nest_imc_counters_release(), nest_imc_event_init(), core_imc_mem_init(), ppc_core_imc_cpu_offline(), core_imc_pmu_cpumask_init(), reset_global_refc(), core_imc_counters_release(), core_imc_event_init(), ppc_thread_imc_cpu_offline(), thread_imc_event_init(), thread_imc_event_add(), thread_imc_event_del(), trace_imc_mem_alloc(), ppc_trace_imc_cpu_offline(), trace_imc_event_add(), trace_imc_event_del(), trace_imc_event_init(), init_nest_pmu_ref(), imc_common_mem_free(), imc_common_cpuhp_mem_free() and init_imc_pmu() functions in arch/powerpc/perf/imc-pmu.c. A local user can perform a denial of service (DoS) attack.
Remediation
External links
- https://git.kernel.org/stable/c/424bcb570cb320d1d15238cd4c933522b90f78fa
- https://git.kernel.org/stable/c/76d588dddc459fefa1da96e0a081a397c5c8e216
- https://git.kernel.org/stable/c/8cbeb60320ac45a8240b561c8ef466b86c34dedc
- https://git.kernel.org/stable/c/a90d339f1f66be4a946769b565668e2bd0686dfa
- https://git.kernel.org/stable/c/d0c6d2a31026102d4738b47a610bed4401b9834f
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.229