Components
Vulnerabilities
Pricing
MCP
Docs
Sign up
Login
Find vulnerabilities. Fix fast with AI.
Search components by package, version, or CVE to get started.
Ecosystem
Package
Version
Vulnerabilities
CVE-2023-54322
CVE-2023-54322
In the Linux kernel, the following vulnerability has been resolved: arm64: set __exception_irq_entry with __irq_entry as a default filter_irq_stacks() is supposed to cut entries which are related irq entries from its call stack. And in_irqentry_text() which is called by filter_irq_stacks() uses __irqentry_text_start/end symbol to find irq entries in callstack. But it doesn't work correctly as without "CONFIG_FUNCTION_GRAPH_TRACER", arm64 kernel doesn't include gic_handle_irq which is entry point of arm64 irq between __irqentry_text_start and __irqentry_text_end as we discussed in below link. https://lore.kernel.org/all/CACT4Y+aReMGLYua2rCLHgFpS9io5cZC04Q8GLs-uNmrn1ezxYQ@mail.gmail.com/#t This problem can makes unintentional deep call stack entries especially in KASAN enabled situation as below. [ 2479.383395]I[0:launcher-loader: 1719] Stack depot reached limit capacity [ 2479.383538]I[0:launcher-loader: 1719] WARNING: CPU: 0 PID: 1719 at lib/stackdepot.c:129 __stack_depot_save+0x464/0x46c [ 2479.385693]I[0:launcher-loader: 1719] pstate: 624000c5 (nZCv daIF +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 2479.385724]I[0:launcher-loader: 1719] pc : __stack_depot_save+0x464/0x46c [ 2479.385751]I[0:launcher-loader: 1719] lr : __stack_depot_save+0x460/0x46c [ 2479.385774]I[0:launcher-loader: 1719] sp : ffffffc0080073c0 [ 2479.385793]I[0:launcher-loader: 1719] x29: ffffffc0080073e0 x28: ffffffd00b78a000 x27: 0000000000000000 [ 2479.385839]I[0:launcher-loader: 1719] x26: 000000000004d1dd x25: ffffff891474f000 x24: 00000000ca64d1dd [ 2479.385882]I[0:launcher-loader: 1719] x23: 0000000000000200 x22: 0000000000000220 x21: 0000000000000040 [ 2479.385925]I[0:launcher-loader: 1719] x20: ffffffc008007440 x19: 0000000000000000 x18: 0000000000000000 [ 2479.385969]I[0:launcher-loader: 1719] x17: 2065726568207475 x16: 000000000000005e x15: 2d2d2d2d2d2d2d20 [ 2479.386013]I[0:launcher-loader: 1719] x14: 5d39313731203a72 x13: 00000000002f6b30 x12: 00000000002f6af8 [ 2479.386057]I[0:launcher-loader: 1719] x11: 00000000ffffffff x10: ffffffb90aacf000 x9 : e8a74a6c16008800 [ 2479.386101]I[0:launcher-loader: 1719] x8 : e8a74a6c16008800 x7 : 00000000002f6b30 x6 : 00000000002f6af8 [ 2479.386145]I[0:launcher-loader: 1719] x5 : ffffffc0080070c8 x4 : ffffffd00b192380 x3 : ffffffd0092b313c [ 2479.386189]I[0:launcher-loader: 1719] x2 : 0000000000000001 x1 : 0000000000000004 x0 : 0000000000000022 [ 2479.386231]I[0:launcher-loader: 1719] Call trace: [ 2479.386248]I[0:launcher-loader: 1719] __stack_depot_save+0x464/0x46c [ 2479.386273]I[0:launcher-loader: 1719] kasan_save_stack+0x58/0x70 [ 2479.386303]I[0:launcher-loader: 1719] save_stack_info+0x34/0x138 [ 2479.386331]I[0:launcher-loader: 1719] kasan_save_free_info+0x18/0x24 [ 2479.386358]I[0:launcher-loader: 1719] ____kasan_slab_free+0x16c/0x170 [ 2479.386385]I[0:launcher-loader: 1719] __kasan_slab_free+0x10/0x20 [ 2479.386410]I[0:launcher-loader: 1719] kmem_cache_free+0x238/0x53c [ 2479.386435]I[0:launcher-loader: 1719] mempool_free_slab+0x1c/0x28 [ 2479.386460]I[0:launcher-loader: 1719] mempool_free+0x7c/0x1a0 [ 2479.386484]I[0:launcher-loader: 1719] bvec_free+0x34/0x80 [ 2479.386514]I[0:launcher-loader: 1719] bio_free+0x60/0x98 [ 2479.386540]I[0:launcher-loader: 1719] bio_put+0x50/0x21c [ 2479.386567]I[0:launcher-loader: 1719] f2fs_write_end_io+0x4ac/0x4d0 [ 2479.386594]I[0:launcher-loader: 1719] bio_endio+0x2dc/0x300 [ 2479.386622]I[0:launcher-loader: 1719] __dm_io_complete+0x324/0x37c [ 2479.386650]I[0:launcher-loader: 1719] dm_io_dec_pending+0x60/0xa4 [ 2479.386676]I[0:launcher-loader: 1719] clone_endio+0xf8/0x2f0 [ 2479.386700]I[0:launcher-loader: 1719] bio_endio+0x2dc/0x300 [ 2479.386727]I[0:launcher-loader: 1719] blk_update_request+0x258/0x63c [ 2479.386754]I[0:launcher-loader: 1719] scsi_end_request+0x50/0x304 [ 2479.386782]I[0:launcher-loader: 1719] scsi_io_completion+0x88/0x160 [ 2479.386808]I[0:launcher-loader: 1719] scsi_finish_command+0x17c/0x194 [ 2479.386833]I ---truncated---
Components Impacted
Components Impacted
Security Details
Security Details
Sonatype Research
Sonatype Research
Published Dec 31, 2025
https://lore.kernel.org/linux-cve-announce/2025123022-CVE-2023-54322-34ba@gregkh/
CVSS Score
Medium
5.9
Ecosystem
Package
Version
Ecosystem
Package
Version
rpm
kernel
2.6.32-131.0.15.el6
rpm
kernel
2.6.32-131.12.1.el6
rpm
kernel
2.6.32-131.17.1.el6
rpm
kernel
2.6.32-131.2.1.el6
rpm
kernel
2.6.32-131.21.1.el6
rpm
kernel
2.6.32-131.4.1.el6
rpm
kernel
2.6.32-131.6.1.el6
rpm
kernel
2.6.32-220.13.1.el6
rpm
kernel
2.6.32-220.17.1.el6
rpm
kernel
2.6.32-220.2.1.el6
rpm
kernel
2.6.32-220.23.1.el6
rpm
kernel
2.6.32-220.4.1.el6
rpm
kernel
2.6.32-220.4.2.el6
rpm
kernel
2.6.32-220.7.1.el6
rpm
kernel
2.6.32-220.el6
rpm
kernel
2.6.32-279.1.1.el6
rpm
kernel
2.6.32-279.11.1.el6
rpm
kernel
2.6.32-279.14.1.el6
rpm
kernel
2.6.32-279.19.1.el6
rpm
kernel
2.6.32-279.2.1.el6
rpm
kernel
2.6.32-279.22.1.el6
rpm
kernel
2.6.32-279.5.1.el6
rpm
kernel
2.6.32-279.5.2.el6
rpm
kernel
2.6.32-279.9.1.el6
rpm
kernel
2.6.32-279.el6
rpm
kernel
2.6.32-358.0.1.el6
rpm
kernel
2.6.32-358.11.1.el6
rpm
kernel
2.6.32-358.14.1.el6
rpm
kernel
2.6.32-358.18.1.el6
rpm
kernel
2.6.32-358.2.1.el6
rpm
kernel
2.6.32-358.23.2.el6
rpm
kernel
2.6.32-358.6.1.el6
rpm
kernel
2.6.32-358.6.2.el6
rpm
kernel
2.6.32-358.el6
rpm
kernel
2.6.32-431.1.2.el6
rpm
kernel
2.6.32-431.11.2.el6
rpm
kernel
2.6.32-431.17.1.el6
rpm
kernel
2.6.32-431.20.3.el6
rpm
kernel
2.6.32-431.20.5.el6
rpm
kernel
2.6.32-431.23.3.el6
rpm
kernel
2.6.32-431.29.2.el6
rpm
kernel
2.6.32-431.3.1.el6
rpm
kernel
2.6.32-431.5.1.el6
rpm
kernel
2.6.32-431.el6
rpm
kernel
2.6.32-504.1.3.el6
rpm
kernel
2.6.32-504.12.2.el6
rpm
kernel
2.6.32-504.16.2.el6
rpm
kernel
2.6.32-504.23.4.el6
rpm
kernel
2.6.32-504.3.3.el6
rpm
kernel
2.6.32-504.30.3.el6
1-50 of 686
CVE-2023-54322 | Components Impacted | Sonatype Guide | Sonatype Guide