{"id":"CVE-2023-53217","summary":"nubus: Partially revert proc_create_single_data() conversion","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nnubus: Partially revert proc_create_single_data() conversion\n\nThe conversion to proc_create_single_data() introduced a regression\nwhereby reading a file in /proc/bus/nubus results in a seg fault:\n\n    # grep -r . /proc/bus/nubus/e/\n    Data read fault at 0x00000020 in Super Data (pc=0x1074c2)\n    BAD KERNEL BUSERR\n    Oops: 00000000\n    Modules linked in:\n    PC: [\u003c001074c2\u003e] PDE_DATA+0xc/0x16\n    SR: 2010  SP: 38284958  a2: 01152370\n    d0: 00000001    d1: 01013000    d2: 01002790    d3: 00000000\n    d4: 00000001    d5: 0008ce2e    a0: 00000000    a1: 00222a40\n    Process grep (pid: 45, task=142f8727)\n    Frame format=B ssw=074d isc=2008 isb=4e5e daddr=00000020 dobuf=01199e70\n    baddr=001074c8 dibuf=ffffffff ver=f\n    Stack from 01199e48:\n\t    01199e70 00222a58 01002790 00000000 011a3000 01199eb0 015000c0 00000000\n\t    00000000 01199ec0 01199ec0 000d551a 011a3000 00000001 00000000 00018000\n\t    d003f000 00000003 00000001 0002800d 01052840 01199fa8 c01f8000 00000000\n\t    00000029 0b532b80 00000000 00000000 00000029 0b532b80 01199ee4 00103640\n\t    011198c0 d003f000 00018000 01199fa8 00000000 011198c0 00000000 01199f4c\n\t    000b3344 011198c0 d003f000 00018000 01199fa8 00000000 00018000 011198c0\n    Call Trace: [\u003c00222a58\u003e] nubus_proc_rsrc_show+0x18/0xa0\n     [\u003c000d551a\u003e] seq_read+0xc4/0x510\n     [\u003c00018000\u003e] fp_fcos+0x2/0x82\n     [\u003c0002800d\u003e] __sys_setreuid+0x115/0x1c6\n     [\u003c00103640\u003e] proc_reg_read+0x5c/0xb0\n     [\u003c00018000\u003e] fp_fcos+0x2/0x82\n     [\u003c000b3344\u003e] __vfs_read+0x2c/0x13c\n     [\u003c00018000\u003e] fp_fcos+0x2/0x82\n     [\u003c00018000\u003e] fp_fcos+0x2/0x82\n     [\u003c000b8aa2\u003e] sys_statx+0x60/0x7e\n     [\u003c000b34b6\u003e] vfs_read+0x62/0x12a\n     [\u003c00018000\u003e] fp_fcos+0x2/0x82\n     [\u003c00018000\u003e] fp_fcos+0x2/0x82\n     [\u003c000b39c2\u003e] ksys_read+0x48/0xbe\n     [\u003c00018000\u003e] fp_fcos+0x2/0x82\n     [\u003c000b3a4e\u003e] sys_read+0x16/0x1a\n     [\u003c00018000\u003e] fp_fcos+0x2/0x82\n     [\u003c00002b84\u003e] syscall+0x8/0xc\n     [\u003c00018000\u003e] fp_fcos+0x2/0x82\n     [\u003c0000c016\u003e] not_ext+0xa/0x18\n    Code: 4e5e 4e75 4e56 0000 206e 0008 2068 ffe8 \u003c2068\u003e 0020 2008 4e5e 4e75 4e56 0000 2f0b 206e 0008 2068 0004 2668 0020 206b ffe8\n    Disabling lock debugging due to kernel taint\n\n    Segmentation fault\n\nThe proc_create_single_data() conversion does not work because\nsingle_open(file, nubus_proc_rsrc_show, PDE_DATA(inode)) is not\nequivalent to the original code.","modified":"2026-04-11T12:46:43.202371Z","published":"2025-09-15T14:21:44.831Z","related":["SUSE-SU-2025:03600-1","SUSE-SU-2025:03634-1","SUSE-SU-2025:20851-1","SUSE-SU-2025:20861-1","SUSE-SU-2025:20870-1","SUSE-SU-2025:20898-1","SUSE-SU-2025:3751-1","SUSE-SU-2025:4057-1","SUSE-SU-2025:4132-1","SUSE-SU-2025:4141-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53217.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/0e96647cff9224db564a1cee6efccb13dbe11ee2"},{"type":"WEB","url":"https://git.kernel.org/stable/c/67e3b5230cefed1eca470c460a2035f02986cebb"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9877533e1401dbbb2c7da8badda05d196aa07623"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a03f2f4bd49030f57849227be9ba38a3eb1edb61"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c06edf13f4cf7f9e8ff4bc6f7e951e4f074dc105"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f70407e8e0272e00d133c5e039168ff1bae6bcac"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53217.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53217"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"3f3942aca6da351a12543aa776467791b63b3a78"},{"fixed":"f70407e8e0272e00d133c5e039168ff1bae6bcac"},{"fixed":"c06edf13f4cf7f9e8ff4bc6f7e951e4f074dc105"},{"fixed":"67e3b5230cefed1eca470c460a2035f02986cebb"},{"fixed":"9877533e1401dbbb2c7da8badda05d196aa07623"},{"fixed":"a03f2f4bd49030f57849227be9ba38a3eb1edb61"},{"fixed":"0e96647cff9224db564a1cee6efccb13dbe11ee2"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53217.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"4.18.0"},{"fixed":"5.10.188"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.120"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.38"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.3.12"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.4.0"},{"fixed":"6.4.2"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53217.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}