Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2023-52498

Summary
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At-29 Feb, 2024 | 15:52
Updated At-04 May, 2025 | 07:38
Rejected At-
Credits

PM: sleep: Fix possible deadlocks in core system-wide PM code

In the Linux kernel, the following vulnerability has been resolved: PM: sleep: Fix possible deadlocks in core system-wide PM code It is reported that in low-memory situations the system-wide resume core code deadlocks, because async_schedule_dev() executes its argument function synchronously if it cannot allocate memory (and not only in that case) and that function attempts to acquire a mutex that is already held. Executing the argument function synchronously from within dpm_async_fn() may also be problematic for ordering reasons (it may cause a consumer device's resume callback to be invoked before a requisite supplier device's one, for example). Address this by changing the code in question to use async_schedule_dev_nocall() for scheduling the asynchronous execution of device suspend and resume functions and to directly run them synchronously if async_schedule_dev_nocall() returns false.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:Linux
Assigner Org ID:416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At:29 Feb, 2024 | 15:52
Updated At:04 May, 2025 | 07:38
Rejected At:
▼CVE Numbering Authority (CNA)
PM: sleep: Fix possible deadlocks in core system-wide PM code

In the Linux kernel, the following vulnerability has been resolved: PM: sleep: Fix possible deadlocks in core system-wide PM code It is reported that in low-memory situations the system-wide resume core code deadlocks, because async_schedule_dev() executes its argument function synchronously if it cannot allocate memory (and not only in that case) and that function attempts to acquire a mutex that is already held. Executing the argument function synchronously from within dpm_async_fn() may also be problematic for ordering reasons (it may cause a consumer device's resume callback to be invoked before a requisite supplier device's one, for example). Address this by changing the code in question to use async_schedule_dev_nocall() for scheduling the asynchronous execution of device suspend and resume functions and to directly run them synchronously if async_schedule_dev_nocall() returns false.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/base/power/main.c
Default Status
unaffected
Versions
Affected
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before f46eb832389f162ad13cb780d0b8cde93641990d (git)
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before a1d62c775b07213c73f81ae842424c74dd14b5f0 (git)
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before e1c9d32c98309ae764893a481552d3f99d46cb34 (git)
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before e681e29d1f59a04ef773296e4bebb17b1b79f8fe (git)
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 9bd3dce27b01c51295b60e1433e1dadfb16649f7 (git)
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 7839d0078e0d5e6cc2fa0b0dfbee71de74f1e557 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/base/power/main.c
Default Status
affected
Versions
Unaffected
  • From 5.10.210 through 5.10.* (semver)
  • From 5.15.149 through 5.15.* (semver)
  • From 6.1.76 through 6.1.* (semver)
  • From 6.6.15 through 6.6.* (semver)
  • From 6.7.3 through 6.7.* (semver)
  • From 6.8 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/f46eb832389f162ad13cb780d0b8cde93641990d
N/A
https://git.kernel.org/stable/c/a1d62c775b07213c73f81ae842424c74dd14b5f0
N/A
https://git.kernel.org/stable/c/e1c9d32c98309ae764893a481552d3f99d46cb34
N/A
https://git.kernel.org/stable/c/e681e29d1f59a04ef773296e4bebb17b1b79f8fe
N/A
https://git.kernel.org/stable/c/9bd3dce27b01c51295b60e1433e1dadfb16649f7
N/A
https://git.kernel.org/stable/c/7839d0078e0d5e6cc2fa0b0dfbee71de74f1e557
N/A
Hyperlink: https://git.kernel.org/stable/c/f46eb832389f162ad13cb780d0b8cde93641990d
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/a1d62c775b07213c73f81ae842424c74dd14b5f0
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/e1c9d32c98309ae764893a481552d3f99d46cb34
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/e681e29d1f59a04ef773296e4bebb17b1b79f8fe
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/9bd3dce27b01c51295b60e1433e1dadfb16649f7
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/7839d0078e0d5e6cc2fa0b0dfbee71de74f1e557
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/f46eb832389f162ad13cb780d0b8cde93641990d
x_transferred
https://git.kernel.org/stable/c/a1d62c775b07213c73f81ae842424c74dd14b5f0
x_transferred
https://git.kernel.org/stable/c/e1c9d32c98309ae764893a481552d3f99d46cb34
x_transferred
https://git.kernel.org/stable/c/e681e29d1f59a04ef773296e4bebb17b1b79f8fe
x_transferred
https://git.kernel.org/stable/c/9bd3dce27b01c51295b60e1433e1dadfb16649f7
x_transferred
https://git.kernel.org/stable/c/7839d0078e0d5e6cc2fa0b0dfbee71de74f1e557
x_transferred
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
x_transferred
Hyperlink: https://git.kernel.org/stable/c/f46eb832389f162ad13cb780d0b8cde93641990d
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/a1d62c775b07213c73f81ae842424c74dd14b5f0
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/e1c9d32c98309ae764893a481552d3f99d46cb34
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/e681e29d1f59a04ef773296e4bebb17b1b79f8fe
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/9bd3dce27b01c51295b60e1433e1dadfb16649f7
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/7839d0078e0d5e6cc2fa0b0dfbee71de74f1e557
Resource:
x_transferred
Hyperlink: https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
Resource:
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At:11 Mar, 2024 | 18:15
Updated At:12 Dec, 2024 | 17:32

In the Linux kernel, the following vulnerability has been resolved: PM: sleep: Fix possible deadlocks in core system-wide PM code It is reported that in low-memory situations the system-wide resume core code deadlocks, because async_schedule_dev() executes its argument function synchronously if it cannot allocate memory (and not only in that case) and that function attempts to acquire a mutex that is already held. Executing the argument function synchronously from within dpm_async_fn() may also be problematic for ordering reasons (it may cause a consumer device's resume callback to be invoked before a requisite supplier device's one, for example). Address this by changing the code in question to use async_schedule_dev_nocall() for scheduling the asynchronous execution of device suspend and resume functions and to directly run them synchronously if async_schedule_dev_nocall() returns false.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.15.5MEDIUM
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Type: Primary
Version: 3.1
Base score: 5.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CPE Matches

Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions before 5.10.210(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 5.11(inclusive) to 5.15.149(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 5.16(inclusive) to 6.1.76(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 6.2(inclusive) to 6.6.15(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 6.7(inclusive) to 6.7.3(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-667Primarynvd@nist.gov
CWE ID: CWE-667
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://git.kernel.org/stable/c/7839d0078e0d5e6cc2fa0b0dfbee71de74f1e557416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/9bd3dce27b01c51295b60e1433e1dadfb16649f7416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/a1d62c775b07213c73f81ae842424c74dd14b5f0416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/e1c9d32c98309ae764893a481552d3f99d46cb34416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/e681e29d1f59a04ef773296e4bebb17b1b79f8fe416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/f46eb832389f162ad13cb780d0b8cde93641990d416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/7839d0078e0d5e6cc2fa0b0dfbee71de74f1e557af854a3a-2127-422b-91ae-364da2661108
Patch
https://git.kernel.org/stable/c/9bd3dce27b01c51295b60e1433e1dadfb16649f7af854a3a-2127-422b-91ae-364da2661108
Patch
https://git.kernel.org/stable/c/a1d62c775b07213c73f81ae842424c74dd14b5f0af854a3a-2127-422b-91ae-364da2661108
Patch
https://git.kernel.org/stable/c/e1c9d32c98309ae764893a481552d3f99d46cb34af854a3a-2127-422b-91ae-364da2661108
Patch
https://git.kernel.org/stable/c/e681e29d1f59a04ef773296e4bebb17b1b79f8feaf854a3a-2127-422b-91ae-364da2661108
Patch
https://git.kernel.org/stable/c/f46eb832389f162ad13cb780d0b8cde93641990daf854a3a-2127-422b-91ae-364da2661108
Patch
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.htmlaf854a3a-2127-422b-91ae-364da2661108
Patch
Hyperlink: https://git.kernel.org/stable/c/7839d0078e0d5e6cc2fa0b0dfbee71de74f1e557
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/9bd3dce27b01c51295b60e1433e1dadfb16649f7
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/a1d62c775b07213c73f81ae842424c74dd14b5f0
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/e1c9d32c98309ae764893a481552d3f99d46cb34
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/e681e29d1f59a04ef773296e4bebb17b1b79f8fe
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/f46eb832389f162ad13cb780d0b8cde93641990d
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/7839d0078e0d5e6cc2fa0b0dfbee71de74f1e557
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/9bd3dce27b01c51295b60e1433e1dadfb16649f7
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/a1d62c775b07213c73f81ae842424c74dd14b5f0
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/e1c9d32c98309ae764893a481552d3f99d46cb34
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/e681e29d1f59a04ef773296e4bebb17b1b79f8fe
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/f46eb832389f162ad13cb780d0b8cde93641990d
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch

Change History

0
Information is not available yet

Similar CVEs

0Records found

Details not found