CVE-2023-54045Linux vulnerability

7 documents6 sources
Severity
5.8MEDIUM
No vector
EPSS
0.0%
top 84.94%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 24

Description

In the Linux kernel, the following vulnerability has been resolved: audit: fix possible soft lockup in __audit_inode_child() Tracefs or debugfs maybe cause hundreds to thousands of PATH records, too many PATH records maybe cause soft lockup. For example: 1. CONFIG_KASAN=y && CONFIG_PREEMPTION=n 2. auditctl -a exit,always -S open -k key 3. sysctl -w kernel.watchdog_thresh=5 4. mkdir /sys/kernel/debug/tracing/instances/test There may be a soft lockup as follows: watchdog: BUG: soft lockup - CP

Affected Packages4 packages

Linuxlinux/linux_kernel3.3.04.14.326+7
Debianlinux/linux_kernel< 5.10.197-1+3
CVEListV5linux/linux5195d8e217a78697152d64fc09a16e063a022465d061e2bfc20f2914656385816e0d20566213c54c+9
debiandebian/linux< linux 6.1.55-1 (bookworm)

🔴Vulnerability Details

3
OSV
CVE-2023-54045: In the Linux kernel, the following vulnerability has been resolved: audit: fix possible soft lockup in __audit_inode_child() Tracefs or debugfs maybe2025-12-24
OSV
audit: fix possible soft lockup in __audit_inode_child()2025-12-24
GHSA
GHSA-857x-v7jh-w473: In the Linux kernel, the following vulnerability has been resolved: audit: fix possible soft lockup in __audit_inode_child() Tracefs or debugfs mayb2025-12-24

📋Vendor Advisories

2
Red Hat
kernel: audit: fix possible soft lockup in __audit_inode_child()2025-12-24
Debian
CVE-2023-54045: linux - In the Linux kernel, the following vulnerability has been resolved: audit: fix ...2023

🕵️Threat Intelligence

1
Wiz
CVE-2023-54045 Impact, Exploitability, and Mitigation Steps | Wiz