CVE-2023-52485

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Wake DMCUB before sending a command [Why] We can hang in place trying to send commands when the DMCUB isn't powered on. [How] For functions that execute within a DC context or DC lock we can wrap the direct calls to dm_execute_dmub_cmd/list with code that exits idle power optimizations and reallows once we're done with the command submission on success. For DM direct submissions the DM will need to manage the enter/exit sequencing manually. We cannot invoke a DMCUB command directly within the DM execution helper or we can deadlock.
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

09 Jan 2025, 20:20

Type Values Removed Values Added
First Time Linux
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE NVD-CWE-noinfo
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/303197775a97416b62d4da69280d0c120a20e009 - () https://git.kernel.org/stable/c/303197775a97416b62d4da69280d0c120a20e009 - Patch
References () https://git.kernel.org/stable/c/8892780834ae294bc3697c7d0e056d7743900b39 - () https://git.kernel.org/stable/c/8892780834ae294bc3697c7d0e056d7743900b39 - Patch

21 Nov 2024, 08:39

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: activa DMCUB antes de enviar un comando [Por qué] Podemos quedarnos quietos intentando enviar comandos cuando DMCUB no está encendido. [Cómo] Para funciones que se ejecutan dentro de un contexto de DC o bloqueo de DC, podemos ajustar las llamadas directas a dm_execute_dmub_cmd/list con código que salga de las optimizaciones de energía inactivas y se vuelva a permitir una vez que hayamos terminado con el envío del comando en caso de éxito. Para envíos directos de DM, el DM deberá gestionar la secuencia de entrada/salida manualmente. No podemos invocar un comando DMCUB directamente dentro del asistente de ejecución de DM o podemos bloquearnos.
References () https://git.kernel.org/stable/c/303197775a97416b62d4da69280d0c120a20e009 - () https://git.kernel.org/stable/c/303197775a97416b62d4da69280d0c120a20e009 -
References () https://git.kernel.org/stable/c/8892780834ae294bc3697c7d0e056d7743900b39 - () https://git.kernel.org/stable/c/8892780834ae294bc3697c7d0e056d7743900b39 -

29 Feb 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-29 15:15

Updated : 2025-01-09 20:20


NVD link : CVE-2023-52485

Mitre link : CVE-2023-52485

CVE.ORG link : CVE-2023-52485


JSON object : View

Products Affected

linux

  • linux_kernel