DEBIAN-CVE-2023-54152

Source
https://security-tracker.debian.org/tracker/CVE-2023-54152
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2023-54152.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2023-54152
Upstream
Published
2025-12-24T13:16:17.207Z
Modified
2025-12-25T11:15:29.736064Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved: can: j1939: prevent deadlock by moving j1939skerrqueue() This commit addresses a deadlock situation that can occur in certain scenarios, such as when running data TP/ETP transfer and subscribing to the error queue while receiving a net down event. The deadlock involves locks in the following order: 3 j1939sessionlistlock -> activesessionlistlock j1939sessionactivate ... j1939skqueueactivatenext -> sksessionqueuelock ... j1939xtprxeomaone 2 j1939skqueuedropall -> sksessionqueuelock ... j1939sknetdeveventnetdown -> j1939sockslock j1939netdevnotify 1 j1939skerrqueue -> j1939sockslock _j1939sessioncancel -> activesessionlistlock j1939tprxtimer CPU0 CPU1 ---- ---- lock(&priv->activesessionlistlock); lock(&jsk->sksessionqueuelock); lock(&priv->activesessionlistlock); lock(&priv->j1939sockslock); The solution implemented in this commit is to move the j1939skerrqueue() call out of the activesessionlistlock context, thus preventing the deadlock situation.

References

Affected packages

Debian:12 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.1.25-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2023-54152.json"

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.1.25-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2023-54152.json"

Debian:14 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.1.25-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2023-54152.json"