We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2023-53013

ptdma: pt_core_execute_cmd() should use spinlock



Description

In the Linux kernel, the following vulnerability has been resolved: ptdma: pt_core_execute_cmd() should use spinlock The interrupt handler (pt_core_irq_handler()) of the ptdma driver can be called from interrupt context. The code flow in this function can lead down to pt_core_execute_cmd() which will attempt to grab a mutex, which is not appropriate in interrupt context and ultimately leads to a kernel panic. The fix here changes this mutex to a spinlock, which has been verified to resolve the issue.

Reserved 2025-03-27 | Published 2025-03-27 | Updated 2025-05-04 | Assigner Linux

Product status

Default status
unaffected

fa5d823b16a9442d609617abeec31da8b6afa224 before ed0d8f731e0bf1bb12a7a37698ac613db20e2794
affected

fa5d823b16a9442d609617abeec31da8b6afa224 before 13ba563c2c8055ba8a637c9f70bb833b43cb4207
affected

fa5d823b16a9442d609617abeec31da8b6afa224 before 95e5fda3b5f9ed8239b145da3fa01e641cf5d53c
affected

Default status
affected

5.15
affected

Any version before 5.15
unaffected

5.15.91
unaffected

6.1.9
unaffected

6.2
unaffected

References

git.kernel.org/...c/ed0d8f731e0bf1bb12a7a37698ac613db20e2794

git.kernel.org/...c/13ba563c2c8055ba8a637c9f70bb833b43cb4207

git.kernel.org/...c/95e5fda3b5f9ed8239b145da3fa01e641cf5d53c

cve.org (CVE-2023-53013)

nvd.nist.gov (CVE-2023-53013)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2023-53013

Support options

Helpdesk Chat, Email, Knowledgebase