CVE-2024-53053

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-53053
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-53053.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-53053
Downstream
Related
Published
2024-11-19T17:19:37Z
Modified
2025-10-17T16:47:44.211879Z
Summary
scsi: ufs: core: Fix another deadlock during RTC update
Details

In the Linux kernel, the following vulnerability has been resolved:

scsi: ufs: core: Fix another deadlock during RTC update

If ufshcdrtcwork calls ufshcdrpmputsync() and the pm's usagecount is 0, we will enter the runtime suspend callback. However, the runtime suspend callback will wait to flush ufshcdrtcwork, causing a deadlock.

Replace ufshcdrpmputsync() with ufshcdrpm_put() to avoid the deadlock.

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
06701a545e9a3c4e007cff6872a074bf97c40619
Fixed
9aa1f0da237d6b16e36e0a0cc9f746d1d78396ed
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
6bf999e0eb41850d5c857102535d5c53b2ede224
Fixed
a128cfec44709ab1bd1f01d158569bcb2386f54f
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
6bf999e0eb41850d5c857102535d5c53b2ede224
Fixed
cb7e509c4e0197f63717fee54fb41c4990ba8d3a

Affected versions

v6.*

v6.10
v6.10-rc1
v6.10-rc2
v6.10-rc3
v6.10-rc4
v6.10-rc5
v6.10-rc6
v6.10-rc7
v6.11
v6.11-rc1
v6.11-rc2
v6.11-rc3
v6.11-rc4
v6.11-rc5
v6.11-rc6
v6.11-rc7
v6.11.1
v6.11.2
v6.11.3
v6.11.4
v6.11.5
v6.11.6
v6.12-rc1
v6.7
v6.7-rc2
v6.7-rc3
v6.7-rc4
v6.7-rc5
v6.7-rc6
v6.7-rc7
v6.7-rc8
v6.8
v6.8-rc1
v6.8-rc2
v6.8-rc3
v6.8-rc4
v6.8-rc5
v6.8-rc6
v6.8-rc7
v6.9
v6.9-rc1
v6.9-rc2
v6.9-rc3
v6.9-rc4
v6.9-rc5
v6.9-rc6
v6.9-rc7

Database specific

vanir_signatures

[
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9aa1f0da237d6b16e36e0a0cc9f746d1d78396ed",
        "id": "CVE-2024-53053-531a1d47",
        "digest": {
            "line_hashes": [
                "244107332380564387490670662602195569952",
                "108598081111671016650614854683344129042",
                "278042490269574497131655673602966555119",
                "81875197779851313682847636376508527380"
            ],
            "threshold": 0.9
        },
        "signature_version": "v1",
        "deprecated": false,
        "target": {
            "file": "drivers/ufs/core/ufshcd.c"
        },
        "signature_type": "Line"
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a128cfec44709ab1bd1f01d158569bcb2386f54f",
        "id": "CVE-2024-53053-8d81cc61",
        "digest": {
            "line_hashes": [
                "244107332380564387490670662602195569952",
                "108598081111671016650614854683344129042",
                "278042490269574497131655673602966555119",
                "81875197779851313682847636376508527380"
            ],
            "threshold": 0.9
        },
        "signature_version": "v1",
        "deprecated": false,
        "target": {
            "file": "drivers/ufs/core/ufshcd.c"
        },
        "signature_type": "Line"
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@cb7e509c4e0197f63717fee54fb41c4990ba8d3a",
        "id": "CVE-2024-53053-a4ee1d14",
        "digest": {
            "line_hashes": [
                "244107332380564387490670662602195569952",
                "108598081111671016650614854683344129042",
                "278042490269574497131655673602966555119",
                "81875197779851313682847636376508527380"
            ],
            "threshold": 0.9
        },
        "signature_version": "v1",
        "deprecated": false,
        "target": {
            "file": "drivers/ufs/core/ufshcd.c"
        },
        "signature_type": "Line"
    }
]

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.8.0
Fixed
6.11.7