-

CVE-2023-53519

In the Linux kernel, the following vulnerability has been resolved:

media: v4l2-mem2mem: add lock to protect parameter num_rdy

Getting below error when using KCSAN to check the driver. Adding lock to
protect parameter num_rdy when getting the value with function:
v4l2_m2m_num_src_bufs_ready/v4l2_m2m_num_dst_bufs_ready.

kworker/u16:3: [name:report&]BUG: KCSAN: data-race in v4l2_m2m_buf_queue
kworker/u16:3: [name:report&]

kworker/u16:3: [name:report&]read-write to 0xffffff8105f35b94 of 1 bytes by task 20865 on cpu 7:
kworker/u16:3:  v4l2_m2m_buf_queue+0xd8/0x10c

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 690dd4780b3f4d755e4e7883e8c3d1b5052f6bf2
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 7fc7f87725805197388ba749a1801df33000fa50
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < ef009fe2010ea2a3a7045ecb72729cf366e0967b
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < e52de26cb37459b16213438a2c82feb155dd3bbd
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 1676748aa29099fc0abd71e0fb092e76e835f25c
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < c71aa5f1cf961264690f2560503ea396b6e3c680
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < e01ea1c4191ee08440b5f86db98dff695e9cedf9
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 56b5c3e67b0f9af3f45cf393be048ee8d8a92694
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version <= 4.14.*
Version 4.14.324
Status unaffected
Version <= 4.19.*
Version 4.19.293
Status unaffected
Version <= 5.4.*
Version 5.4.255
Status unaffected
Version <= 5.10.*
Version 5.10.192
Status unaffected
Version <= 5.15.*
Version 5.15.128
Status unaffected
Version <= 6.1.*
Version 6.1.47
Status unaffected
Version <= 6.4.*
Version 6.4.12
Status unaffected
Version <= *
Version 6.5
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.03% 0.081
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String