CVE-2023-52981

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-52981
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-52981.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-52981
Related
Published
2025-03-27T17:15:45Z
Modified
2025-03-28T18:11:49Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

drm/i915: Fix request ref counting during error capture & debugfs dump

When GuC support was added to error capture, the reference counting around the request object was broken. Fix it up.

The context based search manages the spinlocking around the search internally. So it needs to grab the reference count internally as well. The execlist only request based search relies on external locking, so it needs an external reference count but within the spinlock not outside it.

The only other caller of the context based search is the code for dumping engine state to debugfs. That code wasn't previously getting an explicit reference at all as it does everything while holding the execlist specific spinlock. So, that needs updaing as well as that spinlock doesn't help when using GuC submission. Rather than trying to conditionally get/put depending on submission model, just change it to always do the get/put.

v2: Explicitly document adding an extra blank line in some dense code (Andy Shevchenko). Fix multiple potential null pointer derefs in case of no request found (some spotted by Tvrtko, but there was more!). Also fix a leaked request in case of !started and another in _gucresetcontext now that intelcontextfindactiverequest is actually reference counting the returned request. v3: Add a _get suffix to intelcontextfindactiverequest now that it grabs a reference (Daniele). v4: Split the intelgucfindhungcontext change to a separate patch and rename intelcontextfindactiverequestget to intelcontextgetactiverequest (Tvrtko). v5: s/locking/reference counting/ in commit message (Tvrtko)

(cherry picked from commit 3700e353781e27f1bc7222f51f2cc36cbeb9b4ec)

References

Affected packages

Debian:12 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.1.11-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.1.11-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}