{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-52660","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2024-03-07T14:49:46.884Z","datePublished":"2024-05-17T12:08:39.897Z","dateUpdated":"2025-05-04T07:41:04.176Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2025-05-04T07:41:04.176Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: rkisp1: Fix IRQ handling due to shared interrupts\n\nThe driver requests the interrupts as IRQF_SHARED, so the interrupt\nhandlers can be called at any time. If such a call happens while the ISP\nis powered down, the SoC will hang as the driver tries to access the\nISP registers.\n\nThis can be reproduced even without the platform sharing the IRQ line:\nEnable CONFIG_DEBUG_SHIRQ and unload the driver, and the board will\nhang.\n\nFix this by adding a new field, 'irqs_enabled', which is used to bail\nout from the interrupt handler when the ISP is not operational."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/media/platform/rockchip/rkisp1/rkisp1-capture.c","drivers/media/platform/rockchip/rkisp1/rkisp1-common.h","drivers/media/platform/rockchip/rkisp1/rkisp1-csi.c","drivers/media/platform/rockchip/rkisp1/rkisp1-dev.c","drivers/media/platform/rockchip/rkisp1/rkisp1-isp.c"],"versions":[{"version":"25cb42af9ffabffec499e9e69e2fd3797774ce5b","lessThan":"abd34206f396d3ae50cddbd5aa840b8cd7f68c63","status":"affected","versionType":"git"},{"version":"25cb42af9ffabffec499e9e69e2fd3797774ce5b","lessThan":"b39b4d207d4f236a74e20d291f6356f2231fd9ee","status":"affected","versionType":"git"},{"version":"25cb42af9ffabffec499e9e69e2fd3797774ce5b","lessThan":"edcf92bc66d8361c51dff953a55210e5cfd95587","status":"affected","versionType":"git"},{"version":"25cb42af9ffabffec499e9e69e2fd3797774ce5b","lessThan":"ffb635bb398fc07cb38f8a7b4a82cbe5f412f08e","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/media/platform/rockchip/rkisp1/rkisp1-capture.c","drivers/media/platform/rockchip/rkisp1/rkisp1-common.h","drivers/media/platform/rockchip/rkisp1/rkisp1-csi.c","drivers/media/platform/rockchip/rkisp1/rkisp1-dev.c","drivers/media/platform/rockchip/rkisp1/rkisp1-isp.c"],"versions":[{"version":"5.6","status":"affected"},{"version":"0","lessThan":"5.6","status":"unaffected","versionType":"semver"},{"version":"6.1.83","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.6.23","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.7.11","lessThanOrEqual":"6.7.*","status":"unaffected","versionType":"semver"},{"version":"6.8","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.6","versionEndExcluding":"6.1.83"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.6","versionEndExcluding":"6.6.23"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.6","versionEndExcluding":"6.7.11"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.6","versionEndExcluding":"6.8"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/abd34206f396d3ae50cddbd5aa840b8cd7f68c63"},{"url":"https://git.kernel.org/stable/c/b39b4d207d4f236a74e20d291f6356f2231fd9ee"},{"url":"https://git.kernel.org/stable/c/edcf92bc66d8361c51dff953a55210e5cfd95587"},{"url":"https://git.kernel.org/stable/c/ffb635bb398fc07cb38f8a7b4a82cbe5f412f08e"}],"title":"media: rkisp1: Fix IRQ handling due to shared interrupts","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-06-17T17:39:29.830848Z","id":"CVE-2023-52660","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-06-17T17:43:38.030Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T23:03:21.359Z"},"title":"CVE Program Container","references":[{"url":"https://git.kernel.org/stable/c/abd34206f396d3ae50cddbd5aa840b8cd7f68c63","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/b39b4d207d4f236a74e20d291f6356f2231fd9ee","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/edcf92bc66d8361c51dff953a55210e5cfd95587","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/ffb635bb398fc07cb38f8a7b4a82cbe5f412f08e","tags":["x_transferred"]}]}]}}