CVE-2023-52884
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
21/06/2024
Last modified:
24/03/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
Input: cyapa - add missing input core locking to suspend/resume functions<br />
<br />
Grab input->mutex during suspend/resume functions like it is done in<br />
other input drivers. This fixes the following warning during system<br />
suspend/resume cycle on Samsung Exynos5250-based Snow Chromebook:<br />
<br />
------------[ cut here ]------------<br />
WARNING: CPU: 1 PID: 1680 at drivers/input/input.c:2291 input_device_enabled+0x68/0x6c<br />
Modules linked in: ...<br />
CPU: 1 PID: 1680 Comm: kworker/u4:12 Tainted: G W 6.6.0-rc5-next-20231009 #14109<br />
Hardware name: Samsung Exynos (Flattened Device Tree)<br />
Workqueue: events_unbound async_run_entry_fn<br />
unwind_backtrace from show_stack+0x10/0x14<br />
show_stack from dump_stack_lvl+0x58/0x70<br />
dump_stack_lvl from __warn+0x1a8/0x1cc<br />
__warn from warn_slowpath_fmt+0x18c/0x1b4<br />
warn_slowpath_fmt from input_device_enabled+0x68/0x6c<br />
input_device_enabled from cyapa_gen3_set_power_mode+0x13c/0x1dc<br />
cyapa_gen3_set_power_mode from cyapa_reinitialize+0x10c/0x15c<br />
cyapa_reinitialize from cyapa_resume+0x48/0x98<br />
cyapa_resume from dpm_run_callback+0x90/0x298<br />
dpm_run_callback from device_resume+0xb4/0x258<br />
device_resume from async_resume+0x20/0x64<br />
async_resume from async_run_entry_fn+0x40/0x15c<br />
async_run_entry_fn from process_scheduled_works+0xbc/0x6a8<br />
process_scheduled_works from worker_thread+0x188/0x454<br />
worker_thread from kthread+0x108/0x140<br />
kthread from ret_from_fork+0x14/0x28<br />
Exception stack(0xf1625fb0 to 0xf1625ff8)<br />
...<br />
---[ end trace 0000000000000000 ]---<br />
...<br />
------------[ cut here ]------------<br />
WARNING: CPU: 1 PID: 1680 at drivers/input/input.c:2291 input_device_enabled+0x68/0x6c<br />
Modules linked in: ...<br />
CPU: 1 PID: 1680 Comm: kworker/u4:12 Tainted: G W 6.6.0-rc5-next-20231009 #14109<br />
Hardware name: Samsung Exynos (Flattened Device Tree)<br />
Workqueue: events_unbound async_run_entry_fn<br />
unwind_backtrace from show_stack+0x10/0x14<br />
show_stack from dump_stack_lvl+0x58/0x70<br />
dump_stack_lvl from __warn+0x1a8/0x1cc<br />
__warn from warn_slowpath_fmt+0x18c/0x1b4<br />
warn_slowpath_fmt from input_device_enabled+0x68/0x6c<br />
input_device_enabled from cyapa_gen3_set_power_mode+0x13c/0x1dc<br />
cyapa_gen3_set_power_mode from cyapa_reinitialize+0x10c/0x15c<br />
cyapa_reinitialize from cyapa_resume+0x48/0x98<br />
cyapa_resume from dpm_run_callback+0x90/0x298<br />
dpm_run_callback from device_resume+0xb4/0x258<br />
device_resume from async_resume+0x20/0x64<br />
async_resume from async_run_entry_fn+0x40/0x15c<br />
async_run_entry_fn from process_scheduled_works+0xbc/0x6a8<br />
process_scheduled_works from worker_thread+0x188/0x454<br />
worker_thread from kthread+0x108/0x140<br />
kthread from ret_from_fork+0x14/0x28<br />
Exception stack(0xf1625fb0 to 0xf1625ff8)<br />
...<br />
---[ end trace 0000000000000000 ]---
Impact
Base Score 3.x
4.40
Severity 3.x
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.161 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.93 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.33 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.9.4 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/7b4e0b39182cf5e677c1fc092a3ec40e621c25b6
- https://git.kernel.org/stable/c/9400caf566f65c703e99d95f87b00c4b445627a7
- https://git.kernel.org/stable/c/a4c638ab25786bd5aab5978fe51b2b9be16a4ebd
- https://git.kernel.org/stable/c/a5fc298fa8f67cf1f0e1fc126eab70578cd40adc
- https://git.kernel.org/stable/c/f99809fdeb50d65bcbc1661ef391af94eebb8a75
- https://git.kernel.org/stable/c/7b4e0b39182cf5e677c1fc092a3ec40e621c25b6
- https://git.kernel.org/stable/c/9400caf566f65c703e99d95f87b00c4b445627a7
- https://git.kernel.org/stable/c/a4c638ab25786bd5aab5978fe51b2b9be16a4ebd
- https://git.kernel.org/stable/c/a5fc298fa8f67cf1f0e1fc126eab70578cd40adc
- https://git.kernel.org/stable/c/f99809fdeb50d65bcbc1661ef391af94eebb8a75