Satheesh575555 / linux-4.1.15_CVE-2022-42703

Other
0 stars 0 forks source link

CVE-2023-34324 (Medium) detected in linux-stable-rtv4.1.33 - autoclosed #865

Closed mend-bolt-for-github[bot] closed 6 months ago

mend-bolt-for-github[bot] commented 8 months ago

CVE-2023-34324 - Medium Severity Vulnerability

Vulnerable Library - linux-stable-rtv4.1.33

Julia Cartwright's fork of linux-stable-rt.git

Library home page: https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git

Found in base branch: master

Vulnerable Source Files (2)

/drivers/xen/events/events_base.c /drivers/xen/events/events_base.c

Vulnerability Details

Closing of an event channel in the Linux kernel can result in a deadlock. This happens when the close is being performed in parallel to an unrelated Xen console action and the handling of a Xen console interrupt in an unprivileged guest. The closing of an event channel is e.g. triggered by removal of a paravirtual device on the other side. As this action will cause console messages to be issued on the other side quite often, the chance of triggering the deadlock is not neglectable. Note that 32-bit Arm-guests are not affected, as the 32-bit Linux kernel on Arm doesn't use queued-RW-locks, which are required to trigger the issue (on Arm32 a waiting writer doesn't block further readers to get the lock).

Publish Date: 2024-01-05

URL: CVE-2023-34324

CVSS 3 Score Details (4.9)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: High - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://www.linuxkernelcves.com/cves/CVE-2023-39192

Release Date: 2024-01-05

Fix Resolution: v4.14.327,v4.19.296,v5.4.258,v5.10.198,v5.15.135,v6.1.57,v6.5.7,v6.6-rc6


Step up your Open Source Security Game with Mend here