CVE-2023-54246Function Call with Incorrectly Specified Arguments in Linux

Severity
2.5LOW
No vector
EPSS
0.0%
top 92.57%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 30

Description

In the Linux kernel, the following vulnerability has been resolved: rcuscale: Move rcu_scale_writer() schedule_timeout_uninterruptible() to _idle() The rcuscale.holdoff module parameter can be used to delay the start of rcu_scale_writer() kthread. However, the hung-task timeout will trigger when the timeout specified by rcuscale.holdoff is greater than hung_task_timeout_secs: runqemu kvm nographic slirp qemuparams="-smp 4 -m 2048M" bootparams="rcuscale.shutdown=0 rcuscale.holdoff=300" [ 247.

Affected Packages4 packages

Linuxlinux/linux_kernel4.7.05.10.197+3
Debianlinux/linux_kernel< 5.10.197-1+3
CVEListV5linux/linuxdf37e66bfdbb57e8cae7dbf39a0c66b1b870133855887adc76e19aec9763186e2c1d0a3481d20e96+5
debiandebian/linux< linux 6.1.55-1 (bookworm)

🔴Vulnerability Details

3
OSV
CVE-2023-54246: In the Linux kernel, the following vulnerability has been resolved: rcuscale: Move rcu_scale_writer() schedule_timeout_uninterruptible() to _idle() Th2025-12-30
GHSA
GHSA-qqm3-hrh7-jh6j: In the Linux kernel, the following vulnerability has been resolved: rcuscale: Move rcu_scale_writer() schedule_timeout_uninterruptible() to _idle()2025-12-30
OSV
rcuscale: Move rcu_scale_writer() schedule_timeout_uninterruptible() to _idle()2025-12-30

📋Vendor Advisories

2
Red Hat
kernel: rcuscale: Move rcu_scale_writer() schedule_timeout_uninterruptible() to _idle()2025-12-30
Debian
CVE-2023-54246: linux - In the Linux kernel, the following vulnerability has been resolved: rcuscale: M...2023

🕵️Threat Intelligence

1
Wiz
CVE-2023-54246 Impact, Exploitability, and Mitigation Steps | Wiz