Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      CodeSOD: Functionally, a Date

      September 16, 2025

      Creating Elastic And Bounce Effects With Expressive Animator

      September 16, 2025

      Microsoft shares Insiders preview of Visual Studio 2026

      September 16, 2025

      From Data To Decisions: UX Strategies For Real-Time Dashboards

      September 13, 2025

      DistroWatch Weekly, Issue 1139

      September 14, 2025

      Building personal apps with open source and AI

      September 12, 2025

      What Can We Actually Do With corner-shape?

      September 12, 2025

      Craft, Clarity, and Care: The Story and Work of Mengchu Yao

      September 12, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Can I use React Server Components (RSCs) today?

      September 16, 2025
      Recent

      Can I use React Server Components (RSCs) today?

      September 16, 2025

      Perficient Named among Notable Providers in Forrester’s Q3 2025 Commerce Services Landscape

      September 16, 2025

      Sarah McDowell Helps Clients Build a Strong AI Foundation Through Salesforce

      September 16, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      I Ran Local LLMs on My Android Phone

      September 16, 2025
      Recent

      I Ran Local LLMs on My Android Phone

      September 16, 2025

      DistroWatch Weekly, Issue 1139

      September 14, 2025

      sudo vs sudo-rs: What You Need to Know About the Rust Takeover of Classic Sudo Command

      September 14, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Security»Common Vulnerabilities and Exposures (CVEs)»CVE-2023-53122 – RISC-V SiFive Errata Patching Mutex Vulnerability

    CVE-2023-53122 – RISC-V SiFive Errata Patching Mutex Vulnerability

    May 2, 2025

    CVE ID : CVE-2023-53122

    Published : May 2, 2025, 4:15 p.m. | 34 minutes ago

    Description : In the Linux kernel, the following vulnerability has been resolved:

    RISC-V: fix taking the text_mutex twice during sifive errata patching

    Chris pointed out that some bonehead, *cough* me *cough*, added two
    mutex_locks() to the SiFive errata patching. The second was meant to
    have been a mutex_unlock().

    This results in errors such as

    Unable to handle kernel NULL pointer dereference at virtual address 0000000000000030
    Oops [#1]
    Modules linked in:
    CPU: 0 PID: 0 Comm: swapper Not tainted
    6.2.0-rc1-starlight-00079-g9493e6f3ce02 #229
    Hardware name: BeagleV Starlight Beta (DT)
    epc : __schedule+0x42/0x500
    ra : schedule+0x46/0xce
    epc : ffffffff8065957c ra : ffffffff80659a80 sp : ffffffff81203c80
    gp : ffffffff812d50a0 tp : ffffffff8120db40 t0 : ffffffff81203d68
    t1 : 0000000000000001 t2 : 4c45203a76637369 s0 : ffffffff81203cf0
    s1 : ffffffff8120db40 a0 : 0000000000000000 a1 : ffffffff81213958
    a2 : ffffffff81213958 a3 : 0000000000000000 a4 : 0000000000000000
    a5 : ffffffff80a1bd00 a6 : 0000000000000000 a7 : 0000000052464e43
    s2 : ffffffff8120db41 s3 : ffffffff80a1ad00 s4 : 0000000000000000
    s5 : 0000000000000002 s6 : ffffffff81213938 s7 : 0000000000000000
    s8 : 0000000000000000 s9 : 0000000000000001 s10: ffffffff812d7204
    s11: ffffffff80d3c920 t3 : 0000000000000001 t4 : ffffffff812e6dd7
    t5 : ffffffff812e6dd8 t6 : ffffffff81203bb8
    status: 0000000200000100 badaddr: 0000000000000030 cause: 000000000000000d
    [] schedule+0x46/0xce
    [] schedule_preempt_disabled+0x16/0x28
    [] __mutex_lock.constprop.0+0x3fe/0x652
    [] __mutex_lock_slowpath+0xe/0x16
    [] mutex_lock+0x42/0x4c
    [] sifive_errata_patch_func+0xf6/0x18c
    [] _apply_alternatives+0x74/0x76
    [] apply_boot_alternatives+0x3c/0xfa
    [] setup_arch+0x60c/0x640
    [] start_kernel+0x8e/0x99c
    —[ end trace 0000000000000000 ]—

    [Palmer: pick up Geert’s bug report from the thread]

    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCVE-2023-53125 – “Linux Kernel SMSc75xx Network Stack Buffer Overflow”
    Next Article CVE-2023-53123 – Linux Kernel PCI s390 Use-After-Free Vulnerability

    Related Posts

    Development

    Cursor AI Code Editor Flaw Enables Silent Code Execution via Malicious Repositories

    September 14, 2025
    Development

    Introducing HybridPetya: Petya/NotPetya copycat with UEFI Secure Boot bypass

    September 14, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-47815 – GNU PSPP Heap-Based Buffer Overflow Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Iran Slows Internet to Prevent Cyber Attacks Amid Escalating Regional Conflict

    Development

    This stuff is way better than super glue

    News & Updates

    Developer Spotlight: Ruud Luijten

    News & Updates

    Highlights

    Skywings Marketing: Best Digital Marketing Company in Ghaziabd

    April 22, 2025

    Post Content Source: Read More 

    Tea Dating Advice app spills sensitive data

    July 28, 2025

    Master Database Management Systems

    May 21, 2025

    CodeSOD: The XML Dating Service

    July 9, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.