跳转到帖子

Ubuntu: (CVE-2023-52586): linux-raspi-realtime vulnerability

recommended_posts

发布于
  • Members

Ubuntu: (CVE-2023-52586): linux-raspi-realtime vulnerability

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
03/06/2024
Created
02/12/2025
Added
02/11/2025
Modified
02/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved: drm/msm/dpu: Add mutex lock in control vblank irq Add a mutex lock to control vblank irq to synchronize vblank enable/disable operations happening from different threads to prevent race conditions while registering/unregistering the vblank irq callback. v4: -Removed vblank_ctl_lock from dpu_encoder_virt, so it is only a parameter of dpu_encoder_phys. -Switch from atomic refcnt to a simple int counter as mutex has now been added v3: Mistakenly did not change wording in last version. It is done now. v2: Slightly changed wording of commit message Patchwork: https://patchwork.freedesktop.org/patch/571854/

Solution(s)

  • ubuntu-upgrade-linux-raspi-realtime

References

  • https://attackerkb.com/topics/cve-2023-52586
  • CVE - 2023-52586
  • https://git.kernel.org/linus/45284ff733e4caf6c118aae5131eb7e7cf3eea5a
  • https://git.kernel.org/stable/c/14f109bf74dd67e1d0469fed859c8e506b0df53f
  • https://git.kernel.org/stable/c/45284ff733e4caf6c118aae5131eb7e7cf3eea5a
  • https://www.cve.org/CVERecord?id=CVE-2023-52586
  • 查看数 703
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。
注意:你的帖子需要版主批准后才能看到。

游客
回帖…