vulnerability
Ubuntu: (Multiple Advisories) (CVE-2023-52498): Linux kernel vulnerabilities
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:L/AC:L/Au:S/C:N/I:N/A:C) | 03/11/2024 | 05/17/2024 | 01/30/2025 |
Description
In the Linux kernel, the following vulnerability has been resolved:
PM: sleep: Fix possible deadlocks in core system-wide PM code
It is reported that in low-memory situations the system-wide resume core
code deadlocks, because async_schedule_dev() executes its argument
function synchronously if it cannot allocate memory (and not only in
that case) and that function attempts to acquire a mutex that is already
held. Executing the argument function synchronously from within
dpm_async_fn() may also be problematic for ordering reasons (it may
cause a consumer device's resume callback to be invoked before a
requisite supplier device's one, for example).
Address this by changing the code in question to use
async_schedule_dev_nocall() for scheduling the asynchronous
execution of device suspend and resume functions and to directly
run them synchronously if async_schedule_dev_nocall() returns false.
Solution(s)
References
- CVE-2023-52498
- https://attackerkb.com/topics/CVE-2023-52498
- UBUNTU-USN-6765-1
- UBUNTU-USN-6766-1
- UBUNTU-USN-6766-2
- UBUNTU-USN-6766-3
- UBUNTU-USN-6795-1
- UBUNTU-USN-6818-1
- UBUNTU-USN-6818-2
- UBUNTU-USN-6818-3
- UBUNTU-USN-6818-4
- UBUNTU-USN-6819-1
- UBUNTU-USN-6819-2
- UBUNTU-USN-6819-3
- UBUNTU-USN-6819-4
- UBUNTU-USN-6828-1
- UBUNTU-USN-7159-1
- UBUNTU-USN-7159-2
- UBUNTU-USN-7159-3
- UBUNTU-USN-7159-4
- UBUNTU-USN-7159-5
- UBUNTU-USN-7195-1
- UBUNTU-USN-7195-2

Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.