CVE-2023-54316Use of Uninitialized Resource in Linux

Severity
2.5LOW
No vector
EPSS
0.0%
top 89.30%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 30

Description

In the Linux kernel, the following vulnerability has been resolved: refscale: Fix uninitalized use of wait_queue_head_t Running the refscale test occasionally crashes the kernel with the following error: [ 8569.952896] BUG: unable to handle page fault for address: ffffffffffffffe8 [ 8569.952900] #PF: supervisor read access in kernel mode [ 8569.952902] #PF: error_code(0x0000) - not-present page [ 8569.952904] PGD c4b048067 P4D c4b049067 PUD c4b04b067 PMD 0 [ 8569.952910] Oops: 0000 [#1] PREEM

Affected Packages4 packages

Linuxlinux/linux_kernel5.9.05.10.195+4
Debianlinux/linux_kernel< 5.10.197-1+3
CVEListV5linux/linux653ed64b01dc5989f8f579d0038e987476c2c023066fbd8bc981cf49923bf828b7b4092894df577f+6
debiandebian/linux< linux 6.1.55-1 (bookworm)

🔴Vulnerability Details

3
OSV
CVE-2023-54316: In the Linux kernel, the following vulnerability has been resolved: refscale: Fix uninitalized use of wait_queue_head_t Running the refscale test occa2025-12-30
GHSA
GHSA-2fjh-g9hr-2x3g: In the Linux kernel, the following vulnerability has been resolved: refscale: Fix uninitalized use of wait_queue_head_t Running the refscale test oc2025-12-30
OSV
refscale: Fix uninitalized use of wait_queue_head_t2025-12-30

📋Vendor Advisories

2
Red Hat
kernel: refscale: Fix uninitalized use of wait_queue_head_t2025-12-30
Debian
CVE-2023-54316: linux - In the Linux kernel, the following vulnerability has been resolved: refscale: F...2023

🕵️Threat Intelligence

1
Wiz
CVE-2023-54316 Impact, Exploitability, and Mitigation Steps | Wiz