CVE-2023-54042
Description
In the Linux kernel, the following vulnerability has been resolved:
powerpc/64s: Fix VAS mm use after free
The refcount on mm is dropped before the coprocessor is detached.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
In the Linux kernel, a use-after-free in powerpc/64s VAS occurs when the mm refcount is dropped before detaching the coprocessor.
The vulnerability is a use-after-free bug in the Virtual Accelerator Switchboard (VAS) implementation for powerpc/64s systems in the Linux kernel. The root cause is that the reference count on the memory management (mm) structure is decremented before the coprocessor is fully detached from it. This leaves a window where the mm could be freed while still being accessed by the VAS hardware, leading to a use-after-free condition.
Exploitation
An attacker with local access and the ability to trigger VAS operations could potentially exploit this condition. The attack surface requires being able to initiate VAS contexts or interact with the accelerator hardware. No authentication beyond local user access is needed, and the attacker must be positioned to influence the timing of VAS detach operations.
Impact
If successfully exploited, an attacker could cause a use-after-free, leading to memory corruption, system crash (denial of service), or potentially arbitrary code execution in kernel context. The vulnerability could compromise system stability and security.
Mitigation
The fix, available in the Linux kernel stable releases, ensures the mm refcount is not dropped until after the coprocessor detachment is complete. Users should update their kernel to the patched version [1][2]. No workaround is mentioned.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
5f7d92313002b4e82f92c349edb8657fdd53c421cd1544480b4bda59b4787Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
5- git.kernel.org/stable/c/421cd1544480f2458042fe7f4913a2069c4d7251nvd
- git.kernel.org/stable/c/4e82f92c349ea603736ade1e814861c0182a55adnvd
- git.kernel.org/stable/c/b4bda59b47879cce38a6ec5a01cd3cac702b5331nvd
- git.kernel.org/stable/c/db8657fdd53c5e3069149d7f957cb60e63027bb2nvd
- git.kernel.org/stable/c/f7d92313002b2d543500cc417d8079aaed1fb0a8nvd
News mentions
0No linked articles in our index yet.