In the Linux kernel, the following vulnerability has been resolved: bus: mhi: host: Drop chan lock before queuing buffers Ensure read and write locks for the channel are not taken in succession by dropping the read lock from parse_xfer_event() such that a callback given to client can potentially queue buffers and acquire the write lock in that process. Any queueing of buffers should be done without channel read lock acquired as it can result in multiple locks and a soft lockup. [mani: added fixes tag and cc'ed stable]
History

Thu, 12 Dec 2024 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Linux
Linux linux Kernel
Weaknesses CWE-667
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
Metrics cvssV3_1

{'score': 4.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H'}

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


Fri, 22 Nov 2024 12:00:00 +0000

Type Values Removed Values Added
References

Mon, 04 Nov 2024 13:45:00 +0000

Type Values Removed Values Added
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published: 2024-02-29T15:52:11.074Z

Updated: 2024-12-19T08:20:52.476Z

Reserved: 2024-02-20T12:30:33.304Z

Link: CVE-2023-52493

cve-icon Vulnrichment

Updated: 2024-08-02T23:03:20.707Z

cve-icon NVD

Status : Analyzed

Published: 2024-03-11T18:15:16.940

Modified: 2024-12-12T15:57:46.703

Link: CVE-2023-52493

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-02-29T00:00:00Z

Links: CVE-2023-52493 - Bugzilla