DEBIAN-CVE-2023-53351

Source
https://security-tracker.debian.org/tracker/CVE-2023-53351
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2023-53351.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2023-53351
Upstream
Published
2025-09-17T15:15:39.057Z
Modified
2025-12-12T11:01:03.943757Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved: drm/sched: Check scheduler work queue before calling timeout handling During an IGT GPU reset test we see again oops despite of commit 0c8c901aaaebc9 (drm/sched: Check scheduler ready before calling timeout handling). It uses ready condition whether to call drmschedfault which unwind the TDR leads to GPU reset. However it looks the ready condition is overloaded with other meanings, for example, for the following stack is related GPU reset : 0 gfxv90cpgfxstart 1 gfxv90cpgfxresume 2 gfxv90cpresume 3 gfxv90hwinit 4 gfxv90resume 5 amdgpudeviceipresumephase2 does the following: /* start the ring */ gfxv90cpgfxstart(adev); ring->sched.ready = true; The same approach is for other ASICs as well : gfxv80cpgfxresume gfxv100kiqresume, etc... As a result, our GPU reset test causes GPU fault which calls unconditionally gfxv90fault and then drmschedfault. However now it depends on whether the interrupt service routine drmschedfault is executed after gfxv90cpgfxstart is completed which sets the ready field of the scheduler to true even for uninitialized schedulers and causes oops vs no fault or when ISR drmschedfault is completed prior gfxv90cpgfxstart and NULL pointer dereference does not occur. Use the field timeout_wq to prevent oops for uninitialized schedulers. The field could be initialized by the work queue of resetting the domain. v1: Corrections to commit message (Luben)

References

Affected packages

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.3.7-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2023-53351.json"

Debian:14 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.3.7-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2023-53351.json"