CVE-2023-54316

EUVD-2023-60488
In the Linux kernel, the following vulnerability has been resolved:

refscale: Fix uninitalized use of wait_queue_head_t

Running the refscale test occasionally crashes the kernel with the
following error:

[ 8569.952896] BUG: unable to handle page fault for address: ffffffffffffffe8
[ 8569.952900] #PF: supervisor read access in kernel mode
[ 8569.952902] #PF: error_code(0x0000) - not-present page
[ 8569.952904] PGD c4b048067 P4D c4b049067 PUD c4b04b067 PMD 0
[ 8569.952910] Oops: 0000 [#1] PREEMPT_RT SMP NOPTI
[ 8569.952916] Hardware name: Dell Inc. PowerEdge R750/0WMWCR, BIOS 1.2.4 05/28/2021
[ 8569.952917] RIP: 0010:prepare_to_wait_event+0x101/0x190
  :
[ 8569.952940] Call Trace:
[ 8569.952941]  <TASK>
[ 8569.952944]  ref_scale_reader+0x380/0x4a0 [refscale]
[ 8569.952959]  kthread+0x10e/0x130
[ 8569.952966]  ret_from_fork+0x1f/0x30
[ 8569.952973]  </TASK>

The likely cause is that init_waitqueue_head() is called after the call to
the torture_create_kthread() function that creates the ref_scale_reader
kthread.  Although this init_waitqueue_head() call will very likely
complete before this kthread is created and starts running, it is
possible that the calling kthread will be delayed between the calls to
torture_create_kthread() and init_waitqueue_head().  In this case, the
new kthread will use the waitqueue head before it is properly initialized,
which is not good for the kernel's health and well-being.

The above crash happened here:

	static inline void __add_wait_queue(...)
	{
		:
		if (!(wq->flags & WQ_FLAG_PRIORITY)) <=== Crash here

The offset of flags from list_head entry in wait_queue_entry is
-0x18. If reader_tasks[i].wq.head.next is NULL as allocated reader_task
structure is zero initialized, the instruction will try to access address
0xffffffffffffffe8, which is exactly the fault address listed above.

This commit therefore invokes init_waitqueue_head() before creating
the kthread.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
UNKNOWN
---
Awaiting analysis
This vulnerability is currently awaiting analysis.
Base Score
CVSS 3.x
EPSS Score
Percentile: 14%
Debian logo
Debian Releases
Debian Product
Codename
linux
bookworm
6.1.148-1
fixed
bookworm (security)
6.1.158-1
fixed
bullseye
5.10.223-1
fixed
bullseye (security)
5.10.247-1
fixed
forky
6.17.13-1
fixed
sid
6.17.13-1
fixed
trixie
6.12.57-1
fixed
trixie (security)
6.12.48-1
fixed
openSUSE logo
openSUSE / SLES Releases
openSUSE Product
Release
cluster-md-kmp-default
suse enterprise server 15 SP6
6.4.0-150600.23.84.1
fixed
dlm-kmp-default
suse enterprise server 15 SP6
6.4.0-150600.23.84.1
fixed
gfs2-kmp-default
suse enterprise server 15 SP6
6.4.0-150600.23.84.1
fixed
kernel-64kb
suse enterprise desktop 15 SP7
6.4.0-150700.53.28.1
fixed
suse enterprise sap 15 SP7
6.4.0-150700.53.28.1
fixed
suse enterprise server 15 SP6
6.4.0-150600.23.84.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.53.28.1
fixed
kernel-azure
suse enterprise sap 15 SP7
6.4.0-150700.20.24.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.20.24.1
fixed
kernel-default
suse enterprise desktop 15 SP7
6.4.0-150700.53.28.1
fixed
suse enterprise sap 15 SP7
6.4.0-150700.53.28.1
fixed
suse enterprise server 15 SP6
6.4.0-150600.23.84.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.53.28.1
fixed
kernel-default-base
suse enterprise desktop 15 SP7
6.4.0-150700.53.28.1.150700.17.19.1
fixed
suse enterprise sap 15 SP7
6.4.0-150700.53.28.1.150700.17.19.1
fixed
suse enterprise server 15 SP6
6.4.0-150600.23.84.1.150600.12.38.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.53.28.1.150700.17.19.1
fixed
kernel-docs
suse enterprise desktop 15 SP7
6.4.0-150700.53.28.1
fixed
suse enterprise sap 15 SP7
6.4.0-150700.53.28.1
fixed
suse enterprise server 15 SP6
6.4.0-150600.23.84.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.53.28.1
fixed
kernel-macros
suse enterprise desktop 15 SP7
6.4.0-150700.53.28.1
fixed
suse enterprise sap 15 SP7
6.4.0-150700.53.28.1
fixed
suse enterprise server 15 SP6
6.4.0-150600.23.84.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.53.28.1
fixed
kernel-obs-build
suse enterprise desktop 15 SP7
6.4.0-150700.53.28.1
fixed
suse enterprise sap 15 SP7
6.4.0-150700.53.28.1
fixed
suse enterprise server 15 SP6
6.4.0-150600.23.84.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.53.28.1
fixed
kernel-source
suse enterprise desktop 15 SP7
6.4.0-150700.53.28.1
fixed
suse enterprise sap 15 SP7
6.4.0-150700.53.28.1
fixed
suse enterprise server 15 SP6
6.4.0-150600.23.84.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.53.28.1
fixed
kernel-source-azure
suse enterprise sap 15 SP7
6.4.0-150700.20.24.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.20.24.1
fixed
kernel-syms
suse enterprise desktop 15 SP7
6.4.0-150700.53.28.1
fixed
suse enterprise sap 15 SP7
6.4.0-150700.53.28.1
fixed
suse enterprise server 15 SP6
6.4.0-150600.23.84.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.53.28.1
fixed
kernel-syms-azure
suse enterprise sap 15 SP7
6.4.0-150700.20.24.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.20.24.1
fixed
kernel-zfcpdump
suse enterprise desktop 15 SP7
6.4.0-150700.53.28.1
fixed
suse enterprise sap 15 SP7
6.4.0-150700.53.28.1
fixed
suse enterprise server 15 SP6
6.4.0-150600.23.84.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.53.28.1
fixed
ocfs2-kmp-default
suse enterprise server 15 SP6
6.4.0-150600.23.84.1
fixed
reiserfs-kmp-default
suse enterprise server 15 SP6
6.4.0-150600.23.84.1
fixed
Red Hat logo
Red Hat Enterprise Linux Releases
Red Hat Product
Release
bpftool
RHEL 9
0:7.3.0-427.13.1.el9_4
fixed
kernel
RHEL 9
0:5.14.0-427.13.1.el9_4
fixed
kernel-64k
RHEL 9
0:5.14.0-427.13.1.el9_4
fixed
kernel-64k-core
RHEL 9
0:5.14.0-427.13.1.el9_4
fixed
kernel-64k-debug
RHEL 9
0:5.14.0-427.13.1.el9_4
fixed
kernel-64k-debug-core
RHEL 9
0:5.14.0-427.13.1.el9_4
fixed
kernel-64k-debug-devel
RHEL 9
0:5.14.0-427.13.1.el9_4
fixed
kernel-64k-debug-devel-matched
RHEL 9
0:5.14.0-427.13.1.el9_4
fixed
kernel-64k-debug-modules
RHEL 9
0:5.14.0-427.13.1.el9_4
fixed
kernel-64k-debug-modules-core
RHEL 9
0:5.14.0-427.13.1.el9_4
fixed
kernel-64k-debug-modules-extra
RHEL 9
0:5.14.0-427.13.1.el9_4
fixed
kernel-64k-devel
RHEL 9
0:5.14.0-427.13.1.el9_4
fixed
kernel-64k-devel-matched
RHEL 9
0:5.14.0-427.13.1.el9_4
fixed
kernel-64k-modules
RHEL 9
0:5.14.0-427.13.1.el9_4
fixed
kernel-64k-modules-core
RHEL 9
0:5.14.0-427.13.1.el9_4
fixed
kernel-64k-modules-extra
RHEL 9
0:5.14.0-427.13.1.el9_4
fixed
kernel-abi-stablelists
RHEL 9
0:5.14.0-427.13.1.el9_4
fixed
kernel-core
RHEL 9
0:5.14.0-427.13.1.el9_4
fixed
kernel-debug
RHEL 9
0:5.14.0-427.13.1.el9_4
fixed
kernel-debug-core
RHEL 9
0:5.14.0-427.13.1.el9_4
fixed
kernel-debug-devel
RHEL 9
0:5.14.0-427.13.1.el9_4
fixed
kernel-debug-devel-matched
RHEL 9
0:5.14.0-427.13.1.el9_4
fixed
kernel-debug-modules
RHEL 9
0:5.14.0-427.13.1.el9_4
fixed
kernel-debug-modules-core
RHEL 9
0:5.14.0-427.13.1.el9_4
fixed
kernel-debug-modules-extra
RHEL 9
0:5.14.0-427.13.1.el9_4
fixed
kernel-debug-uki-virt
RHEL 9
0:5.14.0-427.13.1.el9_4
fixed
kernel-devel
RHEL 9
0:5.14.0-427.13.1.el9_4
fixed
kernel-devel-matched
RHEL 9
0:5.14.0-427.13.1.el9_4
fixed
kernel-doc
RHEL 9
0:5.14.0-427.13.1.el9_4
fixed
kernel-modules
RHEL 9
0:5.14.0-427.13.1.el9_4
fixed
kernel-modules-core
RHEL 9
0:5.14.0-427.13.1.el9_4
fixed
kernel-modules-extra
RHEL 9
0:5.14.0-427.13.1.el9_4
fixed
kernel-rt
RHEL 9
0:5.14.0-427.13.1.el9_4
fixed
kernel-rt-core
RHEL 9
0:5.14.0-427.13.1.el9_4
fixed
kernel-rt-debug
RHEL 9
0:5.14.0-427.13.1.el9_4
fixed
kernel-rt-debug-core
RHEL 9
0:5.14.0-427.13.1.el9_4
fixed
kernel-rt-debug-devel
RHEL 9
0:5.14.0-427.13.1.el9_4
fixed
kernel-rt-debug-kvm
RHEL 9
0:5.14.0-427.13.1.el9_4
fixed
kernel-rt-debug-modules
RHEL 9
0:5.14.0-427.13.1.el9_4
fixed
kernel-rt-debug-modules-core
RHEL 9
0:5.14.0-427.13.1.el9_4
fixed
kernel-rt-debug-modules-extra
RHEL 9
0:5.14.0-427.13.1.el9_4
fixed
kernel-rt-devel
RHEL 9
0:5.14.0-427.13.1.el9_4
fixed
kernel-rt-kvm
RHEL 9
0:5.14.0-427.13.1.el9_4
fixed
kernel-rt-modules
RHEL 9
0:5.14.0-427.13.1.el9_4
fixed
kernel-rt-modules-core
RHEL 9
0:5.14.0-427.13.1.el9_4
fixed
kernel-rt-modules-extra
RHEL 9
0:5.14.0-427.13.1.el9_4
fixed
kernel-tools
RHEL 9
0:5.14.0-427.13.1.el9_4
fixed
kernel-tools-libs
RHEL 9
0:5.14.0-427.13.1.el9_4
fixed
kernel-tools-libs-devel
RHEL 9
0:5.14.0-427.13.1.el9_4
fixed
kernel-uki-virt
RHEL 9
0:5.14.0-427.13.1.el9_4
fixed
kernel-zfcpdump
RHEL 9
0:5.14.0-427.13.1.el9_4
fixed
kernel-zfcpdump-core
RHEL 9
0:5.14.0-427.13.1.el9_4
fixed
kernel-zfcpdump-devel
RHEL 9
0:5.14.0-427.13.1.el9_4
fixed
kernel-zfcpdump-devel-matched
RHEL 9
0:5.14.0-427.13.1.el9_4
fixed
kernel-zfcpdump-modules
RHEL 9
0:5.14.0-427.13.1.el9_4
fixed
kernel-zfcpdump-modules-core
RHEL 9
0:5.14.0-427.13.1.el9_4
fixed
kernel-zfcpdump-modules-extra
RHEL 9
0:5.14.0-427.13.1.el9_4
fixed
libperf
RHEL 9
0:5.14.0-427.13.1.el9_4
fixed
perf
RHEL 9
0:5.14.0-427.13.1.el9_4
fixed
python3-perf
RHEL 9
0:5.14.0-427.13.1.el9_4
fixed
rtla
RHEL 9
0:5.14.0-427.13.1.el9_4
fixed
rv
RHEL 9
0:5.14.0-427.13.1.el9_4
fixed