CVE-2023-54095
Description
In the Linux kernel, the following vulnerability has been resolved:
powerpc/iommu: Fix notifiers being shared by PCI and VIO buses
fail_iommu_setup() registers the fail_iommu_bus_notifier struct to both PCI and VIO buses. struct notifier_block is a linked list node, so this causes any notifiers later registered to either bus type to also be registered to the other since they share the same node.
This causes issues in (at least) the vgaarb code, which registers a notifier for PCI buses. pci_notify() ends up being called on a vio device, converted with to_pci_dev() even though it's not a PCI device, and finally makes a bad access in vga_arbiter_add_pci_device() as discovered with KASAN:
BUG: KASAN: slab-out-of-bounds in vga_arbiter_add_pci_device+0x60/0xe00 Read of size 4 at addr c000000264c26fdc by task swapper/0/1
Call Trace: dump_stack_lvl+0x1bc/0x2b8 (unreliable) print_report+0x3f4/0xc60 kasan_report+0x244/0x698 __asan_load4+0xe8/0x250 vga_arbiter_add_pci_device+0x60/0xe00 pci_notify+0x88/0x444 notifier_call_chain+0x104/0x320 blocking_notifier_call_chain+0xa0/0x140 device_add+0xac8/0x1d30 device_register+0x58/0x80 vio_register_device_node+0x9ac/0xce0 vio_bus_scan_register_devices+0xc4/0x13c __machine_initcall_pseries_vio_device_init+0x94/0xf0 do_one_initcall+0x12c/0xaa8 kernel_init_freeable+0xa48/0xba8 kernel_init+0x64/0x400 ret_from_kernel_thread+0x5c/0x64
Fix this by creating separate notifier_block structs for each bus type.
[mpe: Add #ifdef to fix CONFIG_IBMVIO=n build]
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A use-after-free-like bug in Linux kernel's powerpc IOMMU code causes notifier corruption between PCI and VIO buses, leading to slab-out-of-bounds access.
Bug
Description In the Linux kernel's powerpc architecture, the fail_iommu_setup() function registers the same notifier_block struct (fail_iommu_bus_notifier) for both PCI and VIO buses. Since struct notifier_block is a linked list node, this sharing means that any notifier later registered for either bus type inadvertently gets added to the other bus's notifier chain. This corrupts the linked list structure and leads to a slab-out-of-bounds read when the VGA arbiter's PCI notifier is called on a VIO device [1].
Exploitation
Conditions The bug is triggered during early boot when the kernel enumerates devices on the VIO bus. The VGA arbiter subsystem registers a PCI bus notifier via pci_notify(). Because the shared notifier node causes cross-contamination, pci_notify() ends up being invoked for a VIO device. The function then calls to_pci_dev() on the non-PCI device, converting the pointer incorrectly, and subsequently performs an out-of-bounds memory access in vga_arbiter_add_pci_device(). No special privileges or attacker interaction are required; it occurs automatically during normal boot on affected powerpc systems.
Impact
An out-of-bounds read of size 4 from a slab object can cause a kernel panic (oops) during boot, preventing the system from starting. The KASAN report shows the read at offset 0xc000000264c26fdc in the VGA arbiter path. This constitutes a denial-of-service vulnerability affecting system availability. No evidence of privilege escalation or data corruption beyond the immediate crash has been provided.
Mitigation
The Linux kernel upstream has applied multiple stable branch patches to fix the issue. The remedy is to allocate separate notifier_block structs for each bus type, preventing the linked list corruption [2][3][4]. Affected users should update their kernel to a version containing the fix. No workaround is available; the bug is entirely in the boot-time initialization path.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
9dc0d107e624c075a4dcdbc9a65bf8a196ba2f08944e3c696a9ddbfed5346f17d5efaafbac46af58588256670c65bf863c37b6908f7b2Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
9- git.kernel.org/stable/c/075a4dcdbc9a5ea793cb8ec8b78a6c0b7636fd52nvd
- git.kernel.org/stable/c/65bf8a196ba25cf65a858b5bb8de80f0aad76691nvd
- git.kernel.org/stable/c/6670c65bf863cd0d44ca24d4c10ef6755b8d9529nvd
- git.kernel.org/stable/c/a9ddbfed53465bc7c411231db32a488066c0c1benvd
- git.kernel.org/stable/c/c37b6908f7b2bd24dcaaf14a180e28c9132b9c58nvd
- git.kernel.org/stable/c/c46af58588253e5e4063bb5ddc78cd12fdf9e55dnvd
- git.kernel.org/stable/c/dc0d107e624ca96aef6dd8722eb33ba3a6d157b0nvd
- git.kernel.org/stable/c/f08944e3c6962b00827de7263a9e20688e79ad84nvd
- git.kernel.org/stable/c/f17d5efaafba3d5f02f0373f7c5f44711d676f3envd
News mentions
0No linked articles in our index yet.