CVE-2023-52624

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Wake DMCUB before executing GPINT commands [Why] DMCUB can be in idle when we attempt to interface with the HW through the GPINT mailbox resulting in a system hang. [How] Add dc_wake_and_execute_gpint() to wrap the wake, execute, sleep sequence. If the GPINT executes successfully then DMCUB will be put back into sleep after the optional response is returned. It functions similar to the inbox command interface.
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

17 Mar 2025, 15:19

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/2ef98c6d753a744e333b7e34b9cf687040fba57d - () https://git.kernel.org/stable/c/2ef98c6d753a744e333b7e34b9cf687040fba57d - Patch
References () https://git.kernel.org/stable/c/e5ffd1263dd5b44929c676171802e7b6af483f21 - () https://git.kernel.org/stable/c/e5ffd1263dd5b44929c676171802e7b6af483f21 - Patch
CWE CWE-77
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8

21 Nov 2024, 08:40

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/2ef98c6d753a744e333b7e34b9cf687040fba57d - () https://git.kernel.org/stable/c/2ef98c6d753a744e333b7e34b9cf687040fba57d -
References () https://git.kernel.org/stable/c/e5ffd1263dd5b44929c676171802e7b6af483f21 - () https://git.kernel.org/stable/c/e5ffd1263dd5b44929c676171802e7b6af483f21 -

27 Mar 2024, 12:29

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: Activa DMCUB antes de ejecutar comandos GPINT [Por qué] DMCUB puede estar inactivo cuando intentamos interactuar con el HW a través del buzón GPINT, lo que provoca un bloqueo del sistema. [Cómo] Agregue dc_wake_and_execute_gpint() para ajustar la secuencia de activación, ejecución y suspensión. Si GPINT se ejecuta correctamente, DMCUB volverá a entrar en modo de suspensión después de que se devuelva la respuesta opcional. Funciona de manera similar a la interfaz de comando de la bandeja de entrada.

26 Mar 2024, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-26 18:15

Updated : 2025-03-17 15:19


NVD link : CVE-2023-52624

Mitre link : CVE-2023-52624

CVE.ORG link : CVE-2023-52624


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')