CVE-2023-54170
Duplicate Key Insertion Bug Causes Linux Kernel Crash
Publication date: 2025-12-30
Last updated on: 2025-12-30
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's key management system when making DNS queries using the dns_query() function. In rare cases, the code can create a duplicate index key in the assoc_array of the destination keyring. This duplication triggers a BUG_ON() check in the assoc_array implementation, causing the kernel to crash. The issue arises when concurrent DNS queries for the same hostname lead to duplicate keys being inserted into the keyring's assoc_array, resulting in a kernel crash.
How can this vulnerability impact me? :
The vulnerability can cause the Linux kernel to crash unexpectedly due to a BUG_ON() triggered by duplicate keys in the keyring assoc_array during DNS queries. This can lead to system instability, potential denial of service, and interruption of services running on the affected system.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring the system logs for kernel BUG messages related to assoc_array.c, specifically messages like 'kernel BUG at ../lib/assoc_array.c:652!' and invalid opcode errors indicating a crash caused by duplicate keys in the keyring assoc_array. You can check the kernel logs using commands such as 'dmesg | grep assoc_array' or 'journalctl -k | grep assoc_array' to find these crash reports.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version where this vulnerability is fixed, as the issue is resolved by a patch that prevents duplicate keys in the keyring assoc_array. Until an update is applied, monitoring for crashes and avoiding workloads that trigger concurrent DNS queries inside the kernel may reduce the risk.