SB20250327143 - Improper locking in Linux kernel include asm



SB20250327143 - Improper locking in Linux kernel include asm

Published: March 27, 2025 Updated: May 11, 2025

Security Bulletin ID SB20250327143
Severity
Low
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Local access
Highest impact Denial of service

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Improper locking (CVE-ID: CVE-2023-53031)

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the DEFINE_MUTEX(), __MUTEX_INITIALIZER(), ppc_nest_imc_cpu_offline(), nest_imc_counters_release(), nest_imc_event_init(), core_imc_mem_init(), ppc_core_imc_cpu_offline(), core_imc_pmu_cpumask_init(), reset_global_refc(), core_imc_counters_release(), core_imc_event_init(), ppc_thread_imc_cpu_offline(), thread_imc_event_init(), thread_imc_event_add(), thread_imc_event_del(), trace_imc_mem_alloc(), ppc_trace_imc_cpu_offline(), trace_imc_event_add(), trace_imc_event_del(), trace_imc_event_init(), init_nest_pmu_ref(), imc_common_mem_free(), imc_common_cpuhp_mem_free() and init_imc_pmu() functions in arch/powerpc/perf/imc-pmu.c. A local user can perform a denial of service (DoS) attack.


Remediation

Install update from vendor's website.