• CVE-2023-52493

发布时间: 2024年4月26日

修改时间: 2024年12月14日

概要

In the Linux kernel, the following vulnerability has been resolved: bus: mhi: host: Drop chan lock before queuing buffers Ensure read and write locks for the channel are not taken in succession by dropping the read lock from parse_xfer_event() such that a callback given to client can potentially queue buffers and acquire the write lock in that process. Any queueing of buffers should be done without channel read lock acquired as it can result in multiple locks and a soft lockup. [mani: added fixes tag and cc'ed stable]

CVSS v3 指标

NVD openEuler
Confidentiality None None
Attack Vector Local Local
CVSS评分 5.5 5.1
Attack Complexity Low High
Privileges Required Low None
Scope Unchanged Unchanged
Integrity None None
User Interaction None None
Availability High High

安全公告

公告名 概要 发布时间
KylinSec-SA-2024-1509 kernel security update 2024年4月26日

影响产品

产品 状态
KY3.4-4A kernel Unaffected
KY3.4-5A kernel Unaffected
KY3.5.1 kernel Fixed
KY3.5.2 kernel Fixed