DEBIAN-CVE-2023-53281

Source
https://security-tracker.debian.org/tracker/CVE-2023-53281
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2023-53281.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2023-53281
Upstream
Published
2025-09-16T08:15:37Z
Modified
2025-09-19T07:33:41.233332Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved: drivers: staging: rtl8723bs: Fix locking in rtwjointimeouthandler() Commit 041879b12ddb ("drivers: staging: rtl8192bs: Fix deadlock in rtwjoinbsseventprehandle()") besides fixing the deadlock also modified _rtwjointimeouthandler() to use spin[un]lockirq() instead of spin[un]lockbh(). rtwjointimeouthandler() calls rtwdojoin() which takes pmlmepriv->scannedqueue.lock using spin[un]lockbh(). This spinunlockbh() call re-enables softirqs which triggers an oops in kernel/softirq.c: localbhenableip() when it calls lockdepassertirqsenabled(): [ 244.506087] WARNING: CPU: 2 PID: 0 at kernel/softirq.c:376 _localbhenableip+0xa6/0x100 ... [ 244.509022] Call Trace: [ 244.509048] <IRQ> [ 244.509100] _rtwjointimeouthandler+0x134/0x170 [r8723bs] [ 244.509468] ? _pfxrtwjointimeouthandler+0x10/0x10 [r8723bs] [ 244.509772] ? pfxrtwjointimeouthandler+0x10/0x10 [r8723bs] [ 244.510076] calltimerfn+0x95/0x2a0 [ 244.510200] _runtimers.part.0+0x1da/0x2d0 This oops is causd by the switch to spin[un]lockirq() which disables the IRQs for the entire duration of _rtwjointimeouthandler(). Disabling the IRQs is not necessary since all code taking this lock runs from either user contexts or from softirqs, switch back to spin[un]lockbh() to fix this.

References

Affected packages

Debian:12 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.1.37-1

Affected versions

6.*

6.1.27-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.3.7-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.3.7-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}