-
CVE-2023-54159
- EPSS 0.05%
- Veröffentlicht 24.12.2025 13:07:08
- Zuletzt bearbeitet 15.04.2026 00:35:42
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
usb: mtu3: fix kernel panic at qmu transfer done irq handler
In the Linux kernel, the following vulnerability has been resolved:
usb: mtu3: fix kernel panic at qmu transfer done irq handler
When handle qmu transfer irq, it will unlock @mtu->lock before give back
request, if another thread handle disconnect event at the same time, and
try to disable ep, it may lock @mtu->lock and free qmu ring, then qmu
irq hanlder may get a NULL gpd, avoid the KE by checking gpd's value before
handling it.
e.g.
qmu done irq on cpu0 thread running on cpu1
qmu_done_tx()
handle gpd [0]
mtu3_requ_complete() mtu3_gadget_ep_disable()
unlock @mtu->lock
give back request lock @mtu->lock
mtu3_ep_disable()
mtu3_gpd_ring_free()
unlock @mtu->lock
lock @mtu->lock
get next gpd [1]
[1]: goto [0] to handle next gpd, and next gpd may be NULL.Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version
48e0d3735aa557a8adaf94632ca3cf78798e8505
Version <
26ca30516b2c49dd04c134cbdf122311c538df98
Status
affected
Version
48e0d3735aa557a8adaf94632ca3cf78798e8505
Version <
012936502a9cb7b0604e85bb961eb15e2bb40dd9
Status
affected
Version
48e0d3735aa557a8adaf94632ca3cf78798e8505
Version <
ee53a7a88027cea765c68f3b00a50b8f58d6f786
Status
affected
Version
48e0d3735aa557a8adaf94632ca3cf78798e8505
Version <
f26273428657ef4ca74740e578ae45a3be492f6f
Status
affected
Version
48e0d3735aa557a8adaf94632ca3cf78798e8505
Version <
b636aff94a67be46582d4321d11743f1a10cc2c1
Status
affected
Version
48e0d3735aa557a8adaf94632ca3cf78798e8505
Version <
3a7d4959560a2ee493ef222e3b63d359365f41ec
Status
affected
Version
48e0d3735aa557a8adaf94632ca3cf78798e8505
Version <
d28f4091ea7ec3510fd6a3c6d433234e7a2bef14
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
5.2
Status
affected
Version
0
Version <
5.2
Status
unaffected
Version <=
5.4.*
Version
5.4.243
Status
unaffected
Version <=
5.10.*
Version
5.10.180
Status
unaffected
Version <=
5.15.*
Version
5.15.111
Status
unaffected
Version <=
6.1.*
Version
6.1.28
Status
unaffected
Version <=
6.2.*
Version
6.2.15
Status
unaffected
Version <=
6.3.*
Version
6.3.2
Status
unaffected
Version <=
*
Version
6.4
Status
unaffected
VulnDex Vulnerability Enrichment
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.05% | 0.144 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|