CVE-2023-53351
BaseFortify
Publication date: 2025-09-17
Last updated on: 2025-12-11
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 6.3.1 (inc) to 6.3.4 (exc) |
| linux | linux_kernel | 6.3 |
| linux | linux_kernel | 6.4 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-908 | The product uses or accesses a resource that has not been initialized. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's DRM scheduler involves improper checking of the scheduler's work queue before handling timeouts. Specifically, the scheduler's 'ready' condition is overloaded with multiple meanings, leading to a situation where a GPU reset test causes a GPU fault that triggers drm_sched_fault unconditionally. This can cause a NULL pointer dereference (oops) when the interrupt service routine drm_sched_fault executes before the scheduler is properly initialized by gfx_v9_0_cp_gfx_start. The fix involves using the 'timeout_wq' field to prevent oops by ensuring the work queue is initialized before timeout handling is called.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash (oops) due to a NULL pointer dereference during GPU reset operations. This can lead to system instability, unexpected GPU resets, and potential loss of data or service interruptions on systems using affected GPU drivers.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is addressed by ensuring that the scheduler work queue (timeout_wq) is checked before calling timeout handling to prevent oops for uninitialized schedulers. Immediate mitigation involves updating the Linux kernel to a version that includes the fix which uses the timeout_wq field to prevent faults during GPU reset sequences.