CVE-2023-54165Race Condition in Linux

CWE-362Race Condition7 documents6 sources
Severity
7.0HIGH
No vector
EPSS
0.0%
top 92.14%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 30

Description

In the Linux kernel, the following vulnerability has been resolved: zsmalloc: move LRU update from zs_map_object() to zs_malloc() Under memory pressure, we sometimes observe the following crash: [ 5694.832838] ------------[ cut here ]------------ [ 5694.842093] list_del corruption, ffff888014b6a448->next is LIST_POISON1 (dead000000000100) [ 5694.858677] WARNING: CPU: 33 PID: 418824 at lib/list_debug.c:47 __list_del_entry_valid+0x42/0x80 [ 5694.961820] CPU: 33 PID: 418824 Comm: fuse_counters.s

Affected Packages3 packages

Linuxlinux/linux_kernel6.2.06.3.5
CVEListV5linux/linux64f768c6b32e1957e2b65b70e97cb4cb62344bc4e95adf7486f2cb5f1bb303113ca30460951923e9+2
debiandebian/linux

🔴Vulnerability Details

3
OSV
CVE-2023-54165: In the Linux kernel, the following vulnerability has been resolved: zsmalloc: move LRU update from zs_map_object() to zs_malloc() Under memory pressur2025-12-30
OSV
zsmalloc: move LRU update from zs_map_object() to zs_malloc()2025-12-30
GHSA
GHSA-wjwc-m4x2-6jp9: In the Linux kernel, the following vulnerability has been resolved: zsmalloc: move LRU update from zs_map_object() to zs_malloc() Under memory press2025-12-30

📋Vendor Advisories

2
Red Hat
kernel: zsmalloc: move LRU update from zs_map_object() to zs_malloc()2025-12-30
Debian
CVE-2023-54165: linux - In the Linux kernel, the following vulnerability has been resolved: zsmalloc: m...2023

🕵️Threat Intelligence

1
Wiz
CVE-2023-54165 Impact, Exploitability, and Mitigation Steps | Wiz