CVE-2023-54073Missing Lock Check in Linux

CWE-414Missing Lock Check7 documents6 sources
Severity
4.4MEDIUM
No vector
EPSS
0.0%
top 92.73%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 24

Description

In the Linux kernel, the following vulnerability has been resolved: tpm: Add !tpm_amd_is_rng_defective() to the hwrng_unregister() call site The following crash was reported: [ 1950.279393] list_del corruption, ffff99560d485790->next is NULL [ 1950.279400] ------------[ cut here ]------------ [ 1950.279401] kernel BUG at lib/list_debug.c:49! [ 1950.279405] invalid opcode: 0000 [#1] PREEMPT SMP NOPTI [ 1950.279407] CPU: 11 PID: 5886 Comm: modprobe Tainted: G O 6.2.8_1 #1 [ 1950.279409] Hardwar

Affected Packages4 packages

Linuxlinux/linux_kernel6.1.06.1.28+2
Debianlinux/linux_kernel< 6.1.37-1+2
CVEListV5linux/linuxb006c439d58db625318bf2207feabf847510a8a61408d27f25c7b73ece7545cb6434965eedc49ddb+4
debiandebian/linux< linux 6.1.37-1 (bookworm)

🔴Vulnerability Details

3
GHSA
GHSA-7q44-jwgv-r9jh: In the Linux kernel, the following vulnerability has been resolved: tpm: Add !tpm_amd_is_rng_defective() to the hwrng_unregister() call site The fol2025-12-24
OSV
CVE-2023-54073: In the Linux kernel, the following vulnerability has been resolved: tpm: Add !tpm_amd_is_rng_defective() to the hwrng_unregister() call site The follo2025-12-24
OSV
tpm: Add !tpm_amd_is_rng_defective() to the hwrng_unregister() call site2025-12-24

📋Vendor Advisories

2
Red Hat
kernel: tpm: Add !tpm_amd_is_rng_defective() to the hwrng_unregister() call site2025-12-24
Debian
CVE-2023-54073: linux - In the Linux kernel, the following vulnerability has been resolved: tpm: Add !t...2023

🕵️Threat Intelligence

1
Wiz
CVE-2023-54073 Impact, Exploitability, and Mitigation Steps | Wiz