CVE-2023-54045

Source
https://cve.org/CVERecord?id=CVE-2023-54045
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54045.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-54045
Downstream
Related
Published
2025-12-24T12:22:56.742Z
Modified
2026-03-31T17:29:20.802714440Z
Summary
audit: fix possible soft lockup in __audit_inode_child()
Details

In the Linux kernel, the following vulnerability has been resolved:

audit: fix possible soft lockup in __auditinodechild()

Tracefs or debugfs maybe cause hundreds to thousands of PATH records, too many PATH records maybe cause soft lockup.

For example: 1. CONFIGKASAN=y && CONFIGPREEMPTION=n 2. auditctl -a exit,always -S open -k key 3. sysctl -w kernel.watchdog_thresh=5 4. mkdir /sys/kernel/debug/tracing/instances/test

There may be a soft lockup as follows: watchdog: BUG: soft lockup - CPU#45 stuck for 7s! [mkdir:15498] Kernel panic - not syncing: softlockup: hung tasks Call trace: dumpbacktrace+0x0/0x30c showstack+0x20/0x30 dumpstack+0x11c/0x174 panic+0x27c/0x494 watchdogtimer_fn+0x2bc/0x390 __run_hrtimer+0x148/0x4fc __hrtimerrunqueues+0x154/0x210 hrtimerinterrupt+0x2c4/0x760 archtimerhandlerphys+0x48/0x60 handlepercpudevid_irq+0xe0/0x340 __handledomainirq+0xbc/0x130 gichandleirq+0x78/0x460 el1_irq+0xb8/0x140 __auditinodechild+0x240/0x7bc tracefscreatefile+0x1b8/0x2a0 tracecreatefile+0x18/0x50 eventcreatedir+0x204/0x30c __traceaddnewevent+0xac/0x100 eventtraceaddtracer+0xa0/0x130 tracearraycreatedir+0x60/0x140 tracearraycreate+0x1e0/0x370 instancemkdir+0x90/0xd0 tracefssyscallmkdir+0x68/0xa0 vfsmkdir+0x21c/0x34c domkdirat+0x1b4/0x1d4 __arm64sysmkdirat+0x4c/0x60 el0svccommon.constprop.0+0xa8/0x240 doel0svc+0x8c/0xc0 el0svc+0x20/0x30 el0synchandler+0xb0/0xb4 el0sync+0x160/0x180

Therefore, we add cond_resched() to __auditinodechild() to fix it.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54045.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
5195d8e217a78697152d64fc09a16e063a022465
Fixed
d061e2bfc20f2914656385816e0d20566213c54c
Fixed
1640c7bd4eddec6c72f3a99cbb74e333a2ce9f5d
Fixed
f6364fa751d7486502c777f124a14d4d543fc5eb
Fixed
98ef243d5900d75a64539a2165745bffbb155d43
Fixed
0152e7758cc4e9f8bfba8dbea4438d8e488d6c08
Fixed
9ca08adb75fb40a8f742c371927ee73f9dc753bf
Fixed
8a40b491372966ba5426e138a53460985565d5a6
Fixed
8e76b944a7b9bddef190ffe2e29c9ae342ab91ed
Fixed
b59bc6e37237e37eadf50cd5de369e913f524463

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54045.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
3.3.0
Fixed
4.14.326
Type
ECOSYSTEM
Events
Introduced
4.15.0
Fixed
4.19.295
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.257
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.195
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.132
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.53
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.4.16
Type
ECOSYSTEM
Events
Introduced
6.5.0
Fixed
6.5.3

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54045.json"