CVE-2023-52583

In the Linux kernel, the following vulnerability has been resolved: ceph: fix deadlock or deadcode of misusing dget() The lock order is incorrect between denty and its parent, we should always make sure that the parent get the lock first. But since this deadcode is never used and the parent dir will always be set from the callers, let's just remove it.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

03 Feb 2025, 14:18

Type Values Removed Values Added
CPE cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-667
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Debian debian Linux
Debian
Linux linux Kernel
Linux
References () https://git.kernel.org/stable/c/196b87e5c00ce021e164a5de0f0d04f4116a9160 - () https://git.kernel.org/stable/c/196b87e5c00ce021e164a5de0f0d04f4116a9160 - Patch
References () https://git.kernel.org/stable/c/6ab4fd508fad942f1f1ba940492f2735e078e980 - () https://git.kernel.org/stable/c/6ab4fd508fad942f1f1ba940492f2735e078e980 - Patch
References () https://git.kernel.org/stable/c/76cb2aa3421fee4fde706dec41b1344bc0a9ad67 - () https://git.kernel.org/stable/c/76cb2aa3421fee4fde706dec41b1344bc0a9ad67 - Patch
References () https://git.kernel.org/stable/c/7f2649c94264d00df6b6ac27161e9f4372a3450e - () https://git.kernel.org/stable/c/7f2649c94264d00df6b6ac27161e9f4372a3450e - Patch
References () https://git.kernel.org/stable/c/a9c15d6e8aee074fae66c04d114f20b84274fcca - () https://git.kernel.org/stable/c/a9c15d6e8aee074fae66c04d114f20b84274fcca - Patch
References () https://git.kernel.org/stable/c/b493ad718b1f0357394d2cdecbf00a44a36fa085 - () https://git.kernel.org/stable/c/b493ad718b1f0357394d2cdecbf00a44a36fa085 - Patch
References () https://git.kernel.org/stable/c/e016e358461b89b231626fcf78c5c38e35c44fd3 - () https://git.kernel.org/stable/c/e016e358461b89b231626fcf78c5c38e35c44fd3 - Patch
References () https://git.kernel.org/stable/c/eb55ba8aa7fb7aad54f40fbf4d8dcdfdba0bebf6 - () https://git.kernel.org/stable/c/eb55ba8aa7fb7aad54f40fbf4d8dcdfdba0bebf6 - Patch
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Mailing List
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - Mailing List

Information

Published : 2024-03-06 07:15

Updated : 2025-02-03 14:18


NVD link : CVE-2023-52583

Mitre link : CVE-2023-52583

CVE.ORG link : CVE-2023-52583


JSON object : View

Products Affected

linux

  • linux_kernel

debian

  • debian_linux
CWE
CWE-667

Improper Locking