← Volver a CVEs
CVE-2023-2269
MEDIUM4.4
Descripcion
A denial of service problem was found, due to a possible recursive locking scenario, resulting in a deadlock in table_clear in drivers/md/dm-ioctl.c in the Linux Kernel Device Mapper-Multipathing sub-component.
Detalles CVE
Puntuacion CVSS v3.14.4
SeveridadMEDIUM
Vector CVSSCVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
Vector de ataqueLOCAL
ComplejidadLOW
Privilegios requeridosHIGH
Interaccion usuarioNONE
Publicado4/25/2023
Ultima modificacion11/21/2024
Fuentenvd
Avistamientos honeypot0
Productos afectados
debian:debian_linuxfedoraproject:fedoralinux:linux_kernelnetapp:h300snetapp:h300s_firmwarenetapp:h410cnetapp:h410c_firmwarenetapp:h410snetapp:h410s_firmwarenetapp:h500snetapp:h500s_firmwarenetapp:h700snetapp:h700s_firmware
Debilidades (CWE)
CWE-413CWE-667
Referencias
https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html(secalert@redhat.com)
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html(secalert@redhat.com)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/63AJUCJTZCII2JMAF7MGZEM66KY7IALT/(secalert@redhat.com)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FBLBKW2WM5YSTS6OGEU5SYHXSJ5EWSTV/(secalert@redhat.com)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IXHBLWYNSUBS77TYPOJTADPDXKBH2F4U/(secalert@redhat.com)
https://lore.kernel.org/lkml/ZD1xyZxb3rHot8PV%40redhat.com/t/(secalert@redhat.com)
https://security.netapp.com/advisory/ntap-20230929-0004/(secalert@redhat.com)
https://www.debian.org/security/2023/dsa-5448(secalert@redhat.com)
https://www.debian.org/security/2023/dsa-5480(secalert@redhat.com)
https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/63AJUCJTZCII2JMAF7MGZEM66KY7IALT/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FBLBKW2WM5YSTS6OGEU5SYHXSJ5EWSTV/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IXHBLWYNSUBS77TYPOJTADPDXKBH2F4U/(af854a3a-2127-422b-91ae-364da2661108)
https://lore.kernel.org/lkml/ZD1xyZxb3rHot8PV%40redhat.com/t/(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20230929-0004/(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2023/dsa-5448(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2023/dsa-5480(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.