4.7 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
4.7 Medium
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
5.1%
In the Linux kernel, the following vulnerability has been resolved:
pmdomain: mediatek: fix race conditions with genpd If the power domains are
registered first with genpd and after that the driver attempts to power
them on in the probe sequence, then it is possible that a race condition
occurs if genpd tries to power them on in the same time. The same is valid
for powering them off before unregistering them from genpd. Attempt to fix
race conditions by first removing the domains from genpd and after that
powering down domains. Also first power up the domains and after that
register them to genpd.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < 5.15.0-112.122 | UNKNOWN |
ubuntu | 23.10 | noarch | linux | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 14.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 16.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < 5.15.0-1063.69 | UNKNOWN |
git.kernel.org/linus/c41336f4d69057cbf88fed47951379b384540df5 (6.8-rc4)
git.kernel.org/stable/c/339ddc983bc1622341d95f244c361cda3da3a4ff
git.kernel.org/stable/c/3cd1d92ee1dbf3e8f988767eb75f26207397792b
git.kernel.org/stable/c/475426ad1ae0bfdfd8f160ed9750903799392438
git.kernel.org/stable/c/c41336f4d69057cbf88fed47951379b384540df5
git.kernel.org/stable/c/f83b9abee9faa4868a6fac4669b86f4c215dae25
launchpad.net/bugs/cve/CVE-2023-52645
nvd.nist.gov/vuln/detail/CVE-2023-52645
security-tracker.debian.org/tracker/CVE-2023-52645
ubuntu.com/security/notices/USN-6820-1
ubuntu.com/security/notices/USN-6820-2
ubuntu.com/security/notices/USN-6821-1
ubuntu.com/security/notices/USN-6821-2
ubuntu.com/security/notices/USN-6821-3
ubuntu.com/security/notices/USN-6821-4
ubuntu.com/security/notices/USN-6828-1
www.cve.org/CVERecord?id=CVE-2023-52645
4.7 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
4.7 Medium
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
5.1%