5.5
CVE-2023-52774
- EPSS 0.01%
- Veröffentlicht 21.05.2024 16:15:16
- Zuletzt bearbeitet 23.09.2025 20:00:36
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: s390/dasd: protect device queue against concurrent access In dasd_profile_start() the amount of requests on the device queue are counted. The access to the device queue is unprotected against concurrent access. With a lot of parallel I/O, especially with alias devices enabled, the device queue can change while dasd_profile_start() is accessing the queue. In the worst case this leads to a kernel panic due to incorrect pointer accesses. Fix this by taking the device lock before accessing the queue and counting the requests. Additionally the check for a valid profile data pointer can be done earlier to avoid unnecessary locking in a hot path.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Linux ≫ Linux Kernel Version >= 3.1 < 4.14.332
Linux ≫ Linux Kernel Version >= 4.15 < 4.19.301
Linux ≫ Linux Kernel Version >= 4.20 < 5.4.263
Linux ≫ Linux Kernel Version >= 5.5 < 5.10.203
Linux ≫ Linux Kernel Version >= 5.11 < 5.15.141
Linux ≫ Linux Kernel Version >= 5.16 < 6.1.65
Linux ≫ Linux Kernel Version >= 6.2 < 6.6.4
Linux ≫ Linux Kernel Version6.7 Updaterc1
Linux ≫ Linux Kernel Version6.7 Updaterc2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.01% | 0.017 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 5.5 | 1.8 | 3.6 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
|
CWE-476 NULL Pointer Dereference
The product dereferences a pointer that it expects to be valid but is NULL.