CVE-2023-54013Deadlock in Linux

CWE-833Deadlock7 documents6 sources
Severity
5.5MEDIUM
No vector
EPSS
0.0%
top 92.35%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 24

Description

In the Linux kernel, the following vulnerability has been resolved: interconnect: Fix locking for runpm vs reclaim For cases where icc_bw_set() can be called in callbaths that could deadlock against shrinker/reclaim, such as runpm resume, we need to decouple the icc locking. Introduce a new icc_bw_lock for cases where we need to serialize bw aggregation and update to decouple that from paths that require memory allocation such as node/link creation/ destruction. Fixes this lockdep splat: WAR

Affected Packages4 packages

Linuxlinux/linux_kernel5.1.06.5.5
Debianlinux/linux_kernel< 6.5.6-1+1
CVEListV5linux/linux11f1ceca7031deefc1a34236ab7b94360016b71d2f3a124696d43de3c837f87a9f767c56ee86cf2a+2
debiandebian/linux< linux 6.5.6-1 (forky)

🔴Vulnerability Details

3
OSV
CVE-2023-54013: In the Linux kernel, the following vulnerability has been resolved: interconnect: Fix locking for runpm vs reclaim For cases where icc_bw_set() can be2025-12-24
GHSA
GHSA-v99q-84v2-8gvx: In the Linux kernel, the following vulnerability has been resolved: interconnect: Fix locking for runpm vs reclaim For cases where icc_bw_set() can2025-12-24
OSV
interconnect: Fix locking for runpm vs reclaim2025-12-24

📋Vendor Advisories

2
Red Hat
kernel: interconnect: Fix locking for runpm vs reclaim2025-12-24
Debian
CVE-2023-54013: linux - In the Linux kernel, the following vulnerability has been resolved: interconnec...2023

🕵️Threat Intelligence

1
Wiz
CVE-2023-54013 Impact, Exploitability, and Mitigation Steps | Wiz