In the Linux kernel, the following vulnerability has been resolved:
ACPI: video: check for error while searching for backlight device parent
If acpi_get_parent() called in acpi_video_dev_register_backlight()
fails, for example, because acpi_ut_acquire_mutex() fails inside
acpi_get_parent), this can lead to incorrect (uninitialized)
acpi_parent handle being passed to acpi_get_pci_dev() for detecting
the parent pci device.
Check acpi_get_parent() result and set parent device only in case of success.
Found by Linux Verification Center (linuxtesting.org) with SVACE.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
17 Dec 2025, 03:43
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| CWE | NVD-CWE-noinfo | |
| References | () https://git.kernel.org/stable/c/1e3a2b9b4039bb4d136dca59fb31e06465e056f3 - Patch | |
| References | () https://git.kernel.org/stable/c/2124c5bc22948fc4d09a23db4a8acdccc7d21e95 - Patch | |
| References | () https://git.kernel.org/stable/c/39af144b6d01d9b40f52e5d773e653957e6c379c - Patch | |
| References | () https://git.kernel.org/stable/c/3a370502a5681986f9828e43be75ce26c6ab24af - Patch | |
| References | () https://git.kernel.org/stable/c/556f02699d33c1f40b1b31bd25828ce08fa165d8 - Patch | |
| References | () https://git.kernel.org/stable/c/72884ce4e10417b1233b614bf134da852df0f15f - Patch | |
| References | () https://git.kernel.org/stable/c/c4e1a0ef0b4782854c9b77a333ca912b392bed2f - Patch | |
| References | () https://git.kernel.org/stable/c/ccd45faf4973746c4f30ea41eec864e5cf191099 - Patch | |
| References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html - Third Party Advisory, Mailing List | |
| References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - Third Party Advisory, Mailing List | |
| First Time |
Linux
Debian Debian debian Linux Linux linux Kernel |
|
| CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
21 Nov 2024, 08:40
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| References | () https://git.kernel.org/stable/c/1e3a2b9b4039bb4d136dca59fb31e06465e056f3 - | |
| References | () https://git.kernel.org/stable/c/2124c5bc22948fc4d09a23db4a8acdccc7d21e95 - | |
| References | () https://git.kernel.org/stable/c/39af144b6d01d9b40f52e5d773e653957e6c379c - | |
| References | () https://git.kernel.org/stable/c/3a370502a5681986f9828e43be75ce26c6ab24af - | |
| References | () https://git.kernel.org/stable/c/556f02699d33c1f40b1b31bd25828ce08fa165d8 - | |
| References | () https://git.kernel.org/stable/c/72884ce4e10417b1233b614bf134da852df0f15f - | |
| References | () https://git.kernel.org/stable/c/c4e1a0ef0b4782854c9b77a333ca912b392bed2f - | |
| References | () https://git.kernel.org/stable/c/ccd45faf4973746c4f30ea41eec864e5cf191099 - |
04 Nov 2024, 13:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
27 Jun 2024, 12:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
25 Jun 2024, 21:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| Summary |
|
17 May 2024, 15:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-05-17 15:15
Updated : 2025-12-17 03:43
NVD link : CVE-2023-52693
Mitre link : CVE-2023-52693
CVE.ORG link : CVE-2023-52693
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
