In the Linux kernel, the following vulnerability has been resolved:
bus: mhi: host: Drop chan lock before queuing buffers
Ensure read and write locks for the channel are not taken in succession by
dropping the read lock from parse_xfer_event() such that a callback given
to client can potentially queue buffers and acquire the write lock in that
process. Any queueing of buffers should be done without channel read lock
acquired as it can result in multiple locks and a soft lockup.
[mani: added fixes tag and cc'ed stable]
References
Configurations
Configuration 1 (hide)
|
History
12 Dec 2024, 15:57
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-667 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
First Time |
Linux linux Kernel
Linux |
|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
References | () https://git.kernel.org/stable/c/01bd694ac2f682fb8017e16148b928482bc8fa4b - Patch | |
References | () https://git.kernel.org/stable/c/20a6dea2d1c68d4e03c6bb50bc12e72e226b5c0e - Patch | |
References | () https://git.kernel.org/stable/c/3c5ec66b4b3f6816f3a6161538672e389e537690 - Patch | |
References | () https://git.kernel.org/stable/c/6e4c84316e2b70709f0d00c33ba3358d9fc8eece - Patch | |
References | () https://git.kernel.org/stable/c/b8eff20d87092e14cac976d057cb0aea2f1d0830 - Patch | |
References | () https://git.kernel.org/stable/c/eaefb9464031215d63c0a8a7e2bfaa00736aa17e - Patch | |
References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Patch |
Information
Published : 2024-03-11 18:15
Updated : 2024-12-12 15:57
NVD link : CVE-2023-52493
Mitre link : CVE-2023-52493
CVE.ORG link : CVE-2023-52493
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-667
Improper Locking