Linux Kernel Vulnerability Affecting ARM64 Architecture
CVE-2023-54322
What is CVE-2023-54322?
A flaw in the Linux kernel's ARM64 architecture relates to the incorrect handling of IRQ entries in relation to the call stack. The function filter_irq_stacks() aims to discard entries tied to IRQ events, yet fails in certain configurations, specifically when 'CONFIG_FUNCTION_GRAPH_TRACER' is not enabled. This omission results in the gic_handle_irq entry not being correctly identified, potentially leading to unintended deep call stack entries during scenarios where KASAN (Kernel Address Sanitizer) is enabled. These deep call stacks can contribute to system instability, causing warnings and limiting the system's overall operational capacity.
Affected Version(s)
Linux 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Linux 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 0bd309f22663f3ee749bea0b6d70642c31a1c0a5
Linux 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2