CVE-2023-52774

Severity CVSS v4.0:
Pending analysis
Type:
CWE-476 NULL Pointer Dereference
Publication date:
21/05/2024
Last modified:
23/09/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> s390/dasd: protect device queue against concurrent access<br /> <br /> In dasd_profile_start() the amount of requests on the device queue are<br /> counted. The access to the device queue is unprotected against<br /> concurrent access. With a lot of parallel I/O, especially with alias<br /> devices enabled, the device queue can change while dasd_profile_start()<br /> is accessing the queue. In the worst case this leads to a kernel panic<br /> due to incorrect pointer accesses.<br /> <br /> Fix this by taking the device lock before accessing the queue and<br /> counting the requests. Additionally the check for a valid profile data<br /> pointer can be done earlier to avoid unnecessary locking in a hot path.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 3.1 (including) 4.14.332 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.15 (including) 4.19.301 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.20 (including) 5.4.263 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.203 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.141 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.65 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.4 (excluding)
cpe:2.3:o:linux:linux_kernel:6.7:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.7:rc2:*:*:*:*:*:*