CVE-2023-54013
Deadlock Vulnerability in Linux Kernel Interconnect Locking Mechanism
Publication date: 2025-12-24
Last updated on: 2025-12-24
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.2.0-rc8 |
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel involves a locking issue in the interconnect (icc) subsystem, specifically related to runpm (runtime power management) and reclaim operations. The problem was a potential deadlock caused by circular locking dependencies when icc_bw_set() was called in callbacks such as runpm resume. The fix introduced a new lock (icc_bw_lock) to separate bandwidth aggregation locking from memory allocation paths, preventing deadlocks.
How can this vulnerability impact me? :
This vulnerability can cause deadlocks in the Linux kernel during runtime power management or memory reclaim operations, potentially leading to system hangs or degraded performance. Such deadlocks can affect system stability and responsiveness, especially on systems relying on the affected interconnect bandwidth management.