-

CVE-2023-54244

In the Linux kernel, the following vulnerability has been resolved:

ACPI: EC: Fix oops when removing custom query handlers

When removing custom query handlers, the handler might still
be used inside the EC query workqueue, causing a kernel oops
if the module holding the callback function was already unloaded.

Fix this by flushing the EC query workqueue when removing
custom query handlers.

Tested on a Acer Travelmate 4002WLMi
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 130e3eac51912f2c866e7d035992ede25f8feac0
Version a62e8f1978f49e52f87a711ff6711b323d4b12ff
Status affected
Version < 0d528a7c421b1f1772fc1d29370b3b5fc0f42b19
Version a62e8f1978f49e52f87a711ff6711b323d4b12ff
Status affected
Version < ccae2233e9935a038a35fe8cfd703df905f700e7
Version a62e8f1978f49e52f87a711ff6711b323d4b12ff
Status affected
Version < 066b90bca755f0b876e7b027b75d1796861d6db0
Version a62e8f1978f49e52f87a711ff6711b323d4b12ff
Status affected
Version < f4a573eed6377d356f835a4b00099d5dacee0da0
Version a62e8f1978f49e52f87a711ff6711b323d4b12ff
Status affected
Version < 86a159fd5bdb01ec34b160cfda1a313b616d9302
Version a62e8f1978f49e52f87a711ff6711b323d4b12ff
Status affected
Version < fd2c99e81ae0dbdd62a154ef9c77fc01715cc020
Version a62e8f1978f49e52f87a711ff6711b323d4b12ff
Status affected
Version < e5b492c6bb900fcf9722e05f4a10924410e170c1
Version a62e8f1978f49e52f87a711ff6711b323d4b12ff
Status affected
Version 1ff7b99e4983d9e93d25e98ba1ce303ad4e4909e
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 2.6.33
Status affected
Version < 2.6.33
Version 0
Status unaffected
Version <= 4.14.*
Version 4.14.316
Status unaffected
Version <= 4.19.*
Version 4.19.284
Status unaffected
Version <= 5.4.*
Version 5.4.244
Status unaffected
Version <= 5.10.*
Version 5.10.181
Status unaffected
Version <= 5.15.*
Version 5.15.113
Status unaffected
Version <= 6.1.*
Version 6.1.30
Status unaffected
Version <= 6.3.*
Version 6.3.4
Status unaffected
Version <= *
Version 6.4
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.04% 0.099
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.