CVE-2023-54316

Source
https://cve.org/CVERecord?id=CVE-2023-54316
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-54316.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-54316
Downstream
Related
Published
2025-12-30T12:23:46.526Z
Modified
2026-04-02T09:46:53.118805Z
Summary
refscale: Fix uninitalized use of wait_queue_head_t
Details

In the Linux kernel, the following vulnerability has been resolved:

refscale: Fix uninitalized use of waitqueuehead_t

Running the refscale test occasionally crashes the kernel with the following error:

[ 8569.952896] BUG: unable to handle page fault for address: ffffffffffffffe8 [ 8569.952900] #PF: supervisor read access in kernel mode [ 8569.952902] #PF: errorcode(0x0000) - not-present page [ 8569.952904] PGD c4b048067 P4D c4b049067 PUD c4b04b067 PMD 0 [ 8569.952910] Oops: 0000 [#1] PREEMPTRT SMP NOPTI [ 8569.952916] Hardware name: Dell Inc. PowerEdge R750/0WMWCR, BIOS 1.2.4 05/28/2021 [ 8569.952917] RIP: 0010:preparetowaitevent+0x101/0x190 : [ 8569.952940] Call Trace: [ 8569.952941] <TASK> [ 8569.952944] refscalereader+0x380/0x4a0 [refscale] [ 8569.952959] kthread+0x10e/0x130 [ 8569.952966] retfrom_fork+0x1f/0x30 [ 8569.952973] </TASK>

The likely cause is that initwaitqueuehead() is called after the call to the torturecreatekthread() function that creates the refscalereader kthread. Although this initwaitqueuehead() call will very likely complete before this kthread is created and starts running, it is possible that the calling kthread will be delayed between the calls to torturecreatekthread() and initwaitqueuehead(). In this case, the new kthread will use the waitqueue head before it is properly initialized, which is not good for the kernel's health and well-being.

The above crash happened here:

static inline void __add_wait_queue(...)
{
    :
    if (!(wq->flags & WQ_FLAG_PRIORITY)) <=== Crash here

The offset of flags from listhead entry in waitqueueentry is -0x18. If readertasks[i].wq.head.next is NULL as allocated reader_task structure is zero initialized, the instruction will try to access address 0xffffffffffffffe8, which is exactly the fault address listed above.

This commit therefore invokes initwaitqueuehead() before creating the kthread.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54316.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
653ed64b01dc5989f8f579d0038e987476c2c023
Fixed
066fbd8bc981cf49923bf828b7b4092894df577f
Fixed
ec9d118ad99dc6f1bc674c1e649c25533d89b9ba
Fixed
e0322a255a2242dbe4686b6176b3c83dea490529
Fixed
e5de968a9032366198720eac4f368ed7e690b3ef
Fixed
70a2856fd1d0a040c876ba9e3f89b949ae92e4dd
Fixed
f5063e8948dad7f31adb007284a5d5038ae31bb8

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-54316.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.9.0
Fixed
5.10.195
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.132
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.53
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.4.16
Type
ECOSYSTEM
Events
Introduced
6.5.0
Fixed
6.5.3

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-54316.json"