{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-52586","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2024-03-02T21:55:42.570Z","datePublished":"2024-03-06T06:45:20.913Z","dateUpdated":"2025-05-04T07:39:16.451Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2025-05-04T07:39:16.451Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/msm/dpu: Add mutex lock in control vblank irq\n\nAdd a mutex lock to control vblank irq to synchronize vblank\nenable/disable operations happening from different threads to prevent\nrace conditions while registering/unregistering the vblank irq callback.\n\nv4: -Removed vblank_ctl_lock from dpu_encoder_virt, so it is only a\n    parameter of dpu_encoder_phys.\n    -Switch from atomic refcnt to a simple int counter as mutex has\n    now been added\nv3: Mistakenly did not change wording in last version. It is done now.\nv2: Slightly changed wording of commit message\n\nPatchwork: https://patchwork.freedesktop.org/patch/571854/"}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/gpu/drm/msm/disp/dpu1/dpu_encoder.c","drivers/gpu/drm/msm/disp/dpu1/dpu_encoder_phys.h","drivers/gpu/drm/msm/disp/dpu1/dpu_encoder_phys_cmd.c","drivers/gpu/drm/msm/disp/dpu1/dpu_encoder_phys_vid.c"],"versions":[{"version":"25fdd5933e4c0f5fe2ea5cd59994f8ac5fbe90ef","lessThan":"14f109bf74dd67e1d0469fed859c8e506b0df53f","status":"affected","versionType":"git"},{"version":"25fdd5933e4c0f5fe2ea5cd59994f8ac5fbe90ef","lessThan":"45284ff733e4caf6c118aae5131eb7e7cf3eea5a","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/gpu/drm/msm/disp/dpu1/dpu_encoder.c","drivers/gpu/drm/msm/disp/dpu1/dpu_encoder_phys.h","drivers/gpu/drm/msm/disp/dpu1/dpu_encoder_phys_cmd.c","drivers/gpu/drm/msm/disp/dpu1/dpu_encoder_phys_vid.c"],"versions":[{"version":"4.19","status":"affected"},{"version":"0","lessThan":"4.19","status":"unaffected","versionType":"semver"},{"version":"6.7.4","lessThanOrEqual":"6.7.*","status":"unaffected","versionType":"semver"},{"version":"6.8","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.19","versionEndExcluding":"6.7.4"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.19","versionEndExcluding":"6.8"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/14f109bf74dd67e1d0469fed859c8e506b0df53f"},{"url":"https://git.kernel.org/stable/c/45284ff733e4caf6c118aae5131eb7e7cf3eea5a"}],"title":"drm/msm/dpu: Add mutex lock in control vblank irq","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T23:03:21.270Z"},"title":"CVE Program Container","references":[{"url":"https://git.kernel.org/stable/c/14f109bf74dd67e1d0469fed859c8e506b0df53f","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/45284ff733e4caf6c118aae5131eb7e7cf3eea5a","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2023-52586","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2024-09-10T15:56:01.645809Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-11T17:33:32.350Z"}}]}}