CVE-2023-52583

In the Linux kernel, the following vulnerability has been resolved: ceph: fix deadlock or deadcode of misusing dget() The lock order is incorrect between denty and its parent, we should always make sure that the parent get the lock first. But since this deadcode is never used and the parent dir will always be set from the callers, let's just remove it.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

03 Feb 2025, 14:18

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux
Linux linux Kernel
Debian debian Linux
Debian
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/196b87e5c00ce021e164a5de0f0d04f4116a9160 - () https://git.kernel.org/stable/c/196b87e5c00ce021e164a5de0f0d04f4116a9160 - Patch
References () https://git.kernel.org/stable/c/6ab4fd508fad942f1f1ba940492f2735e078e980 - () https://git.kernel.org/stable/c/6ab4fd508fad942f1f1ba940492f2735e078e980 - Patch
References () https://git.kernel.org/stable/c/76cb2aa3421fee4fde706dec41b1344bc0a9ad67 - () https://git.kernel.org/stable/c/76cb2aa3421fee4fde706dec41b1344bc0a9ad67 - Patch
References () https://git.kernel.org/stable/c/7f2649c94264d00df6b6ac27161e9f4372a3450e - () https://git.kernel.org/stable/c/7f2649c94264d00df6b6ac27161e9f4372a3450e - Patch
References () https://git.kernel.org/stable/c/a9c15d6e8aee074fae66c04d114f20b84274fcca - () https://git.kernel.org/stable/c/a9c15d6e8aee074fae66c04d114f20b84274fcca - Patch
References () https://git.kernel.org/stable/c/b493ad718b1f0357394d2cdecbf00a44a36fa085 - () https://git.kernel.org/stable/c/b493ad718b1f0357394d2cdecbf00a44a36fa085 - Patch
References () https://git.kernel.org/stable/c/e016e358461b89b231626fcf78c5c38e35c44fd3 - () https://git.kernel.org/stable/c/e016e358461b89b231626fcf78c5c38e35c44fd3 - Patch
References () https://git.kernel.org/stable/c/eb55ba8aa7fb7aad54f40fbf4d8dcdfdba0bebf6 - () https://git.kernel.org/stable/c/eb55ba8aa7fb7aad54f40fbf4d8dcdfdba0bebf6 - Patch
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Mailing List
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - Mailing List
CWE CWE-667

21 Nov 2024, 08:40

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html -
References () https://git.kernel.org/stable/c/196b87e5c00ce021e164a5de0f0d04f4116a9160 - () https://git.kernel.org/stable/c/196b87e5c00ce021e164a5de0f0d04f4116a9160 -
References () https://git.kernel.org/stable/c/6ab4fd508fad942f1f1ba940492f2735e078e980 - () https://git.kernel.org/stable/c/6ab4fd508fad942f1f1ba940492f2735e078e980 -
References () https://git.kernel.org/stable/c/76cb2aa3421fee4fde706dec41b1344bc0a9ad67 - () https://git.kernel.org/stable/c/76cb2aa3421fee4fde706dec41b1344bc0a9ad67 -
References () https://git.kernel.org/stable/c/7f2649c94264d00df6b6ac27161e9f4372a3450e - () https://git.kernel.org/stable/c/7f2649c94264d00df6b6ac27161e9f4372a3450e -
References () https://git.kernel.org/stable/c/a9c15d6e8aee074fae66c04d114f20b84274fcca - () https://git.kernel.org/stable/c/a9c15d6e8aee074fae66c04d114f20b84274fcca -
References () https://git.kernel.org/stable/c/b493ad718b1f0357394d2cdecbf00a44a36fa085 - () https://git.kernel.org/stable/c/b493ad718b1f0357394d2cdecbf00a44a36fa085 -
References () https://git.kernel.org/stable/c/e016e358461b89b231626fcf78c5c38e35c44fd3 - () https://git.kernel.org/stable/c/e016e358461b89b231626fcf78c5c38e35c44fd3 -
References () https://git.kernel.org/stable/c/eb55ba8aa7fb7aad54f40fbf4d8dcdfdba0bebf6 - () https://git.kernel.org/stable/c/eb55ba8aa7fb7aad54f40fbf4d8dcdfdba0bebf6 -

04 Nov 2024, 13:16

Type Values Removed Values Added
References
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}

27 Jun 2024, 13:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html -

25 Jun 2024, 23:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -

06 Mar 2024, 15:18

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: ceph: corrige el punto muerto o el código muerto por uso incorrecto de dget() El orden de bloqueo es incorrecto entre denty y su padre, siempre debemos asegurarnos de que el padre obtenga el bloqueo primero. Pero dado que este código muerto nunca se usa y el directorio principal siempre será configurado por quienes llaman, simplemente eliminémoslo.

06 Mar 2024, 07:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-06 07:15

Updated : 2025-02-03 14:18


NVD link : CVE-2023-52583

Mitre link : CVE-2023-52583

CVE.ORG link : CVE-2023-52583


JSON object : View

Products Affected

linux

  • linux_kernel

debian

  • debian_linux
CWE
CWE-667

Improper Locking