Action not permitted
Modal body text goes here.
CVE-2023-52437
Vulnerability from cvelistv5
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Show details on NVD website{ "containers": { "cna": { "providerMetadata": { "dateUpdated": "2024-02-22T12:35:01.765Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "rejectedReasons": [ { "lang": "en", "value": "This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ] } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2023-52437", "datePublished": "2024-02-20T18:34:48.029Z", "dateRejected": "2024-02-22T12:31:03.445Z", "dateReserved": "2024-02-20T12:30:33.290Z", "dateUpdated": "2024-02-22T12:35:01.765Z", "state": "REJECTED" }, "dataType": "CVE_RECORD", "dataVersion": "5.0", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2023-52437\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-02-20T21:15:08.107\",\"lastModified\":\"2024-02-22T13:15:08.020\",\"vulnStatus\":\"Rejected\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.\"}],\"metrics\":{},\"references\":[]}}" } }
gsd-2023-52437
Vulnerability from gsd
{ "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2023-52437" ], "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nRevert \"md/raid5: Wait for MD_SB_CHANGE_PENDING in raid5d\"\n\nThis reverts commit 5e2cf333b7bd5d3e62595a44d598a254c697cd74.\n\nThat commit introduced the following race and can cause system hung.\n\n md_write_start: raid5d:\n // mddev-\u003ein_sync == 1\n set \"MD_SB_CHANGE_PENDING\"\n // running before md_write_start wakeup it\n waiting \"MD_SB_CHANGE_PENDING\" cleared\n \u003e\u003e\u003e\u003e\u003e\u003e\u003e\u003e\u003e hung\n wakeup mddev-\u003ethread\n ...\n waiting \"MD_SB_CHANGE_PENDING\" cleared\n \u003e\u003e\u003e\u003e hung, raid5d should clear this flag\n but get hung by same flag.\n\nThe issue reverted commit fixing is fixed by last patch in a new way.", "id": "GSD-2023-52437", "modified": "2024-02-21T06:01:53.316473Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@kernel.org", "ID": "CVE-2023-52437", "STATE": "REJECT" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ] } }, "nvd.nist.gov": { "cve": { "descriptions": [ { "lang": "en", "value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ], "id": "CVE-2023-52437", "lastModified": "2024-02-22T13:15:08.020", "metrics": {}, "published": "2024-02-20T21:15:08.107", "references": [], "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "vulnStatus": "Rejected" } } } }
wid-sec-w-2024-0444
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein lokaler Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um einen Denial of Service zu verursachen oder weitere, nicht spezifizierte Angriffe durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0444 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0444.json" }, { "category": "self", "summary": "WID-SEC-2024-0444 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0444" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0855-1 vom 2024-03-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2024-061 vom 2024-03-06", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2024-061.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2024-051 vom 2024-03-06", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2024-051.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0858-1 vom 2024-03-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0857-1 vom 2024-03-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0856-1 vom 2024-03-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0900-1 vom 2024-03-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6688-1 vom 2024-03-11", "url": "https://ubuntu.com/security/notices/USN-6688-1" }, { "category": "external", "summary": "CVE Announce auf lore.kernel.org vom 2024-02-20", "url": "http://lore.kernel.org/linux-cve-announce/2024022009-subsoil-halt-4b28@gregkh/" }, { "category": "external", "summary": "CVE Announce auf lore.kernel.org vom 2024-02-20", "url": "http://lore.kernel.org/linux-cve-announce/2024022017-slit-wish-e5d7@gregkh/" }, { "category": "external", "summary": "CVE Announce auf lore.kernel.org vom 2024-02-20", "url": "http://lore.kernel.org/linux-cve-announce/2024022024-uniquely-recluse-d893@gregkh/" }, { "category": "external", "summary": "CVE Announce auf lore.kernel.org vom 2024-02-20", "url": "http://lore.kernel.org/linux-cve-announce/2024022026-wobbling-jumbo-748e@gregkh/" }, { "category": "external", "summary": "CVE Announce auf lore.kernel.org vom 2024-02-20", "url": "http://lore.kernel.org/linux-cve-announce/2024022033-makeshift-flammable-cb72@gregkh/" }, { "category": "external", "summary": "CVE Announce auf lore.kernel.org vom 2024-02-20", "url": "http://lore.kernel.org/linux-cve-announce/2024022048-rind-huff-b1a2@gregkh/" }, { "category": "external", "summary": "CVE Announce auf lore.kernel.org vom 2024-02-20", "url": "http://lore.kernel.org/linux-cve-announce/2024022056-operative-cork-082c@gregkh/" }, { "category": "external", "summary": "CVE Announce auf lore.kernel.org vom 2024-02-20", "url": "http://lore.kernel.org/linux-cve-announce/2024022058-outsell-equator-e1c5@gregkh/" }, { "category": "external", "summary": "GitHub Advisory Database vom 2024-02-20", "url": "https://github.com/advisories/GHSA-42p9-m692-hxrc" }, { "category": "external", "summary": "GitHub Advisory Database vom 2024-02-20", "url": "https://github.com/advisories/GHSA-25g3-q597-79m8" }, { "category": "external", "summary": "GitHub Advisory Database vom 2024-02-20", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265185" }, { "category": "external", "summary": "GitHub Advisory Database vom 2024-02-20", "url": "https://github.com/advisories/GHSA-7gq6-cq6r-rrpx" }, { "category": "external", "summary": "GitHub Advisory Database vom 2024-02-20", "url": "https://github.com/advisories/GHSA-23gm-fr88-2r8c" }, { "category": "external", "summary": "GitHub Advisory Database vom 2024-02-20", "url": "https://github.com/advisories/GHSA-6vr7-3j3q-8546" }, { "category": "external", "summary": "GitHub Advisory Database vom 2024-02-20", "url": "https://github.com/advisories/GHSA-74mg-f7w3-pcrr" }, { "category": "external", "summary": "GitHub Advisory Database vom 2024-02-20", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265184" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-D16D94B00D vom 2024-02-24", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-d16d94b00d" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-71F0F16533 vom 2024-02-24", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-71f0f16533" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0910-1 vom 2024-03-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0900-2 vom 2024-03-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0926-1 vom 2024-03-22", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0977-1 vom 2024-03-22", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2024-062 vom 2024-04-01", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2024-062.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2024-040 vom 2024-04-01", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2024-040.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2024-053 vom 2024-04-01", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2024-053.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2024-052 vom 2024-04-01", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2024-052.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6724-1 vom 2024-04-09", "url": "https://ubuntu.com/security/notices/USN-6724-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6726-1 vom 2024-04-09", "url": "https://ubuntu.com/security/notices/USN-6726-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6725-1 vom 2024-04-09", "url": "https://ubuntu.com/security/notices/USN-6725-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6725-2 vom 2024-04-16", "url": "https://ubuntu.com/security/notices/USN-6725-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6726-2 vom 2024-04-16", "url": "https://ubuntu.com/security/notices/USN-6726-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6724-2 vom 2024-04-16", "url": "https://ubuntu.com/security/notices/USN-6724-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6726-3 vom 2024-04-17", "url": "https://ubuntu.com/security/notices/USN-6726-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6741-1 vom 2024-04-19", "url": "https://ubuntu.com/security/notices/USN-6741-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6743-1 vom 2024-04-19", "url": "https://ubuntu.com/security/notices/USN-6743-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6742-1 vom 2024-04-19", "url": "https://ubuntu.com/security/notices/USN-6742-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6743-2 vom 2024-04-22", "url": "https://ubuntu.com/security/notices/USN-6743-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6742-2 vom 2024-04-23", "url": "https://ubuntu.com/security/notices/USN-6742-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6743-3 vom 2024-04-25", "url": "https://ubuntu.com/security/notices/USN-6743-3" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:2394 vom 2024-04-30", "url": "https://access.redhat.com/errata/RHSA-2024:2394" }, { "category": "external", "summary": "Debian Security Advisory DSA-5681 vom 2024-05-06", "url": "https://lists.debian.org/debian-security-announce/2024/msg00090.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6767-1 vom 2024-05-07", "url": "https://ubuntu.com/security/notices/USN-6767-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6766-1 vom 2024-05-07", "url": "https://ubuntu.com/security/notices/USN-6766-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6767-2 vom 2024-05-14", "url": "https://ubuntu.com/security/notices/USN-6767-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6766-2 vom 2024-05-15", "url": "https://ubuntu.com/security/notices/USN-6766-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6777-1 vom 2024-05-16", "url": "https://ubuntu.com/security/notices/USN-6777-1" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2024-065 vom 2024-05-20", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2024-065.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6766-3 vom 2024-05-20", "url": "https://ubuntu.com/security/notices/USN-6766-3" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6777-2 vom 2024-05-20", "url": "https://ubuntu.com/security/notices/USN-6777-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6777-3 vom 2024-05-22", "url": "https://ubuntu.com/security/notices/USN-6777-3" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:2950 vom 2024-05-22", "url": "https://access.redhat.com/errata/RHSA-2024:2950" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:3138 vom 2024-05-22", "url": "https://access.redhat.com/errata/RHSA-2024:3138" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6777-4 vom 2024-05-23", "url": "https://ubuntu.com/security/notices/USN-6777-4" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6795-1 vom 2024-05-28", "url": "https://ubuntu.com/security/notices/USN-6795-1" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:3618 vom 2024-06-05", "url": "https://access.redhat.com/errata/RHSA-2024:3618" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:3627 vom 2024-06-05", "url": "https://access.redhat.com/errata/RHSA-2024:3627" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12385 vom 2024-06-05", "url": "https://oss.oracle.com/pipermail/el-errata/2024-June/015806.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12385 vom 2024-06-05", "url": "https://oss.oracle.com/pipermail/el-errata/2024-June/015807.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-3618 vom 2024-06-06", "url": "https://linux.oracle.com/errata/ELSA-2024-3618.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6821-1 vom 2024-06-08", "url": "https://ubuntu.com/security/notices/USN-6821-1" }, { "category": "external", "summary": "IBM Security Bulletin 7156774 vom 2024-06-07", "url": "https://www.ibm.com/support/pages/node/7156774" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6820-1 vom 2024-06-08", "url": "https://ubuntu.com/security/notices/USN-6820-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6821-2 vom 2024-06-10", "url": "https://ubuntu.com/security/notices/USN-6821-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6828-1 vom 2024-06-11", "url": "https://ubuntu.com/security/notices/USN-6828-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6820-2 vom 2024-06-11", "url": "https://ubuntu.com/security/notices/USN-6820-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6821-3 vom 2024-06-11", "url": "https://ubuntu.com/security/notices/USN-6821-3" }, { "category": "external", "summary": "Ubuntu Security Notice LSN-0104-1 vom 2024-06-11", "url": "https://ubuntu.com/security/notices/LSN-0104-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2010-1 vom 2024-06-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-June/018711.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6821-4 vom 2024-06-14", "url": "https://ubuntu.com/security/notices/USN-6821-4" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2185-1 vom 2024-06-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-June/018809.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:2183-1 vom 2024-06-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-June/018808.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-3842 vom 2024-06-25", "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-3841 vom 2024-06-25", "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-3840 vom 2024-06-27", "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6871-1 vom 2024-07-04", "url": "https://ubuntu.com/security/notices/USN-6871-1" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:4415 vom 2024-07-09", "url": "https://access.redhat.com/errata/RHSA-2024:4415" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:4412 vom 2024-07-09", "url": "https://access.redhat.com/errata/RHSA-2024:4412" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6892-1 vom 2024-07-10", "url": "https://ubuntu.com/security/notices/USN-6892-1" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:4831 vom 2024-07-24", "url": "https://access.redhat.com/errata/RHSA-2024:4831" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:4823 vom 2024-07-24", "url": "https://access.redhat.com/errata/RHSA-2024:4823" } ], "source_lang": "en-US", "title": "Linux Kernel: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-07-24T22:00:00.000+00:00", "generator": { "date": "2024-07-25T08:36:18.933+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2024-0444", "initial_release_date": "2024-02-20T23:00:00.000+00:00", "revision_history": [ { "date": "2024-02-20T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-02-25T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Fedora aufgenommen" }, { "date": "2024-03-05T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2024-03-11T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-03-12T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-03-14T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-03-17T23:00:00.000+00:00", "number": "7", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-03-24T23:00:00.000+00:00", "number": "8", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-04-01T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2024-04-09T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-04-16T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-04-17T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-04-21T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-04-22T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-04-23T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-04-24T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-04-29T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-05-06T22:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2024-05-07T22:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-05-13T22:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-05-15T22:00:00.000+00:00", "number": "21", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-05-16T22:00:00.000+00:00", "number": "22", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-05-20T22:00:00.000+00:00", "number": "23", "summary": "Neue Updates von Amazon und Ubuntu aufgenommen" }, { "date": "2024-05-21T22:00:00.000+00:00", "number": "24", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-05-23T22:00:00.000+00:00", "number": "25", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-05-28T22:00:00.000+00:00", "number": "26", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-06-04T22:00:00.000+00:00", "number": "27", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-06-05T22:00:00.000+00:00", "number": "28", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-06-06T22:00:00.000+00:00", "number": "29", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-06-09T22:00:00.000+00:00", "number": "30", "summary": "Neue Updates von Ubuntu und IBM aufgenommen" }, { "date": "2024-06-10T22:00:00.000+00:00", "number": "31", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-06-11T22:00:00.000+00:00", "number": "32", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-06-12T22:00:00.000+00:00", "number": "33", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-06-16T22:00:00.000+00:00", "number": "34", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-06-24T22:00:00.000+00:00", "number": "35", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-06-25T22:00:00.000+00:00", "number": "36", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2024-06-27T22:00:00.000+00:00", "number": "37", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2024-07-03T22:00:00.000+00:00", "number": "38", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-07-09T22:00:00.000+00:00", "number": "39", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-07-10T22:00:00.000+00:00", "number": "40", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-07-24T22:00:00.000+00:00", "number": "41", "summary": "Neue Updates von Red Hat aufgenommen" } ], "status": "final", "version": "41" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Fedora Linux", "product": { "name": "Fedora Linux", "product_id": "74185", "product_identification_helper": { "cpe": "cpe:/o:fedoraproject:fedora:-" } } } ], "category": "vendor", "name": "Fedora" }, { "branches": [ { "category": "product_name", "name": "IBM QRadar SIEM", "product": { "name": "IBM QRadar SIEM", "product_id": "T021415", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:-" } } } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c6.8-rc1", "product": { "name": "Open Source Linux Kernel \u003c6.8-rc1", "product_id": "T032952", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:6.8-rc1" } } }, { "category": "product_version_range", "name": "\u003c6.8-rc4", "product": { "name": "Open Source Linux Kernel \u003c6.8-rc4", "product_id": "T032953", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:6.8-rc4" } } }, { "category": "product_version_range", "name": "\u003c6.7", "product": { "name": "Open Source Linux Kernel \u003c6.7", "product_id": "T032954", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:6.7" } } }, { "category": "product_version_range", "name": "\u003c6.6", "product": { "name": "Open Source Linux Kernel \u003c6.6", "product_id": "T032955", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:6.6" } } } ], "category": "product_name", "name": "Linux Kernel" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-52433", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux-Kernel. Diese Fehler bestehen aufgrund eines use-after-free, eines out-of-bounds write und eines Puffer\u00fcberlaufs. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T021415", "398363", "T004914", "74185" ] }, "release_date": "2024-02-20T23:00:00Z", "title": "CVE-2023-52433" }, { "cve": "CVE-2023-52434", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux-Kernel. Diese Fehler bestehen aufgrund eines use-after-free, eines out-of-bounds write und eines Puffer\u00fcberlaufs. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T021415", "398363", "T004914", "74185" ] }, "release_date": "2024-02-20T23:00:00Z", "title": "CVE-2023-52434" }, { "cve": "CVE-2023-52435", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux-Kernel. Diese Fehler bestehen aufgrund eines use-after-free, eines out-of-bounds write und eines Puffer\u00fcberlaufs. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T021415", "398363", "T004914", "74185" ] }, "release_date": "2024-02-20T23:00:00Z", "title": "CVE-2023-52435" }, { "cve": "CVE-2023-52436", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux-Kernel. Diese Fehler bestehen aufgrund eines use-after-free, eines out-of-bounds write und eines Puffer\u00fcberlaufs. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T021415", "398363", "T004914", "74185" ] }, "release_date": "2024-02-20T23:00:00Z", "title": "CVE-2023-52436" }, { "cve": "CVE-2023-52437", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux-Kernel. Diese Fehler bestehen aufgrund eines use-after-free, eines out-of-bounds write und eines Puffer\u00fcberlaufs. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T021415", "398363", "T004914", "74185" ] }, "release_date": "2024-02-20T23:00:00Z", "title": "CVE-2023-52437" }, { "cve": "CVE-2023-52438", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux-Kernel. Diese Fehler bestehen aufgrund eines use-after-free, eines out-of-bounds write und eines Puffer\u00fcberlaufs. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T021415", "398363", "T004914", "74185" ] }, "release_date": "2024-02-20T23:00:00Z", "title": "CVE-2023-52438" }, { "cve": "CVE-2023-52439", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux-Kernel. Diese Fehler bestehen aufgrund eines use-after-free, eines out-of-bounds write und eines Puffer\u00fcberlaufs. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T021415", "398363", "T004914", "74185" ] }, "release_date": "2024-02-20T23:00:00Z", "title": "CVE-2023-52439" }, { "cve": "CVE-2024-26581", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen im Linux-Kernel. Diese Fehler bestehen aufgrund eines use-after-free, eines out-of-bounds write und eines Puffer\u00fcberlaufs. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen oder einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T021415", "398363", "T004914", "74185" ] }, "release_date": "2024-02-20T23:00:00Z", "title": "CVE-2024-26581" } ] }
ghsa-42p9-m692-hxrc
Vulnerability from github
In the Linux kernel, the following vulnerability has been resolved:
Revert "md/raid5: Wait for MD_SB_CHANGE_PENDING in raid5d"
This reverts commit 5e2cf333b7bd5d3e62595a44d598a254c697cd74.
That commit introduced the following race and can cause system hung.
md_write_start: raid5d: // mddev->in_sync == 1 set "MD_SB_CHANGE_PENDING" // running before md_write_start wakeup it waiting "MD_SB_CHANGE_PENDING" cleared >>>>>>>>> hung wakeup mddev->thread ... waiting "MD_SB_CHANGE_PENDING" cleared
hung, raid5d should clear this flag but get hung by same flag.
The issue reverted commit fixing is fixed by last patch in a new way.
{ "affected": [], "aliases": [ "CVE-2023-52437" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2024-02-20T21:15:08Z", "severity": null }, "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nRevert \"md/raid5: Wait for MD_SB_CHANGE_PENDING in raid5d\"\n\nThis reverts commit 5e2cf333b7bd5d3e62595a44d598a254c697cd74.\n\nThat commit introduced the following race and can cause system hung.\n\n md_write_start: raid5d:\n // mddev-\u003ein_sync == 1\n set \"MD_SB_CHANGE_PENDING\"\n // running before md_write_start wakeup it\n waiting \"MD_SB_CHANGE_PENDING\" cleared\n \u003e\u003e\u003e\u003e\u003e\u003e\u003e\u003e\u003e hung\n wakeup mddev-\u003ethread\n ...\n waiting \"MD_SB_CHANGE_PENDING\" cleared\n \u003e\u003e\u003e\u003e hung, raid5d should clear this flag\n but get hung by same flag.\n\nThe issue reverted commit fixing is fixed by last patch in a new way.", "id": "GHSA-42p9-m692-hxrc", "modified": "2024-02-20T21:30:26Z", "published": "2024-02-20T21:30:26Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52437" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/0de40f76d567133b871cd6ad46bb87afbce46983" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/84c39986fe6dd77aa15f08712339f5d4eb7dbe27" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/87165c64fe1a98bbab7280c58df3c83be2c98478" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/aab69ef769707ad987ff905d79e0bd6591812580" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/bed0acf330b2c50c688f6d9cfbcac2aa57a8e613" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/bed9e27baf52a09b7ba2a3714f1e24e17ced386d" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/cfa46838285814c3a27faacf7357f0a65bb5d152" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/e16a0bbdb7e590a6607b0d82915add738c03c069" } ], "schema_version": "1.4.0", "severity": [] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.