Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-52493
HistoryMar 11, 2024 - 12:00 a.m.

CVE-2023-52493

2024-03-1100:00:00
ubuntu.com
ubuntu.com
5
linux kernel
vulnerability
cve-2023-52493
fixed
dropping channel lock
buffer queuing
soft lockup

7.5 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

10.4%

In the Linux kernel, the following vulnerability has been resolved: bus:
mhi: host: Drop chan lock before queuing buffers Ensure read and write
locks for the channel are not taken in succession by dropping the read lock
from parse_xfer_event() such that a callback given to client can
potentially queue buffers and acquire the write lock in that process. Any
queueing of buffers should be done without channel read lock acquired as it
can result in multiple locks and a soft lockup. [mani: added fixes tag and
cc’ed stable]

Notes

Author Note
rodrigo-zaiden USN-6765-1 for linux-oem-6.5 wrongly stated that this CVE was fixed in version 6.5.0-1022.23. The mentioned notice was revoked and the state of the fix for linux-oem-6.5 was recovered to the previous state.

References

7.5 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

10.4%