CVE-2023-53281

Source
https://cve.org/CVERecord?id=CVE-2023-53281
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53281.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53281
Downstream
Related
Published
2025-09-16T08:11:15.364Z
Modified
2026-03-20T12:33:04.383248Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
drivers: staging: rtl8723bs: Fix locking in _rtw_join_timeout_handler()
Details

In the Linux kernel, the following vulnerability has been resolved:

drivers: staging: rtl8723bs: Fix locking in rtwjointimeouthandler()

Commit 041879b12ddb ("drivers: staging: rtl8192bs: Fix deadlock in rtwjoinbsseventprehandle()") besides fixing the deadlock also modified rtwjointimeouthandler() to use spin[un]lockirq() instead of spin[un]lock_bh().

rtwjointimeouthandler() calls rtwdojoin() which takes pmlmepriv->scannedqueue.lock using spin[un]lockbh(). This spinunlock_bh() call re-enables softirqs which triggers an oops in kernel/softirq.c: __localbhenableip() when it calls lockdepassertirqsenabled():

[ 244.506087] WARNING: CPU: 2 PID: 0 at kernel/softirq.c:376 __localbhenableip+0xa6/0x100 ... [ 244.509022] Call Trace: [ 244.509048] <IRQ> [ 244.509100] rtwjointimeouthandler+0x134/0x170 [r8723bs] [ 244.509468] ? pfxrtwjointimeouthandler+0x10/0x10 [r8723bs] [ 244.509772] ? pfxrtw_jointimeouthandler+0x10/0x10 [r8723bs] [ 244.510076] calltimerfn+0x95/0x2a0 [ 244.510200] _runtimers.part.0+0x1da/0x2d0

This oops is causd by the switch to spin_[un]lockirq() which disables the IRQs for the entire duration of rtwjointimeout_handler().

Disabling the IRQs is not necessary since all code taking this lock runs from either user contexts or from softirqs, switch back to spin_[un]lock_bh() to fix this.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53281.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
ae60744d5fad840b9d056d35b4b652d95e755846
Fixed
209850f17717a3b5cc558578bef5631ac7045539
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
041879b12ddb0c6c83ed9c0bdd10dc82a056f2fc
Fixed
2a50e44a66d268ee5db3d177f1fdc1503dbce6e7
Fixed
dc327e87c6d9bfd9ee08e76396b3c0ba848ec554
Fixed
4ab1bace1dd3875371b481ef4301c4671bddea22
Fixed
215792eda008f6a1e7ed9d77fa20d582d22bb114
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
1f6c99b94ca3caad346876b3e22e3ca3d25bc8ee
Last affected
eca9748d9267a38d532464e3305a38629e9c35a9

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53281.json"