Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-52774
HistoryMay 21, 2024 - 12:00 a.m.

CVE-2023-52774

2024-05-2100:00:00
ubuntu.com
ubuntu.com
3
linux kernel
s390/dasd
vulnerability
device queue
concurrent access
kernel panic
fix
device lock
profile data

AI Score

6.5

Confidence

Low

EPSS

0

Percentile

13.0%

In the Linux kernel, the following vulnerability has been resolved:
s390/dasd: protect device queue against concurrent access In
dasd_profile_start() the amount of requests on the device queue are
counted. The access to the device queue is unprotected against concurrent
access. With a lot of parallel I/O, especially with alias devices enabled,
the device queue can change while dasd_profile_start() is accessing the
queue. In the worst case this leads to a kernel panic due to incorrect
pointer accesses. Fix this by taking the device lock before accessing the
queue and counting the requests. Additionally the check for a valid profile
data pointer can be done earlier to avoid unnecessary locking in a hot
path.

AI Score

6.5

Confidence

Low

EPSS

0

Percentile

13.0%