Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-52914

Опубликовано: 21 авг. 2024
Источник: debian
EPSS Низкий

Описание

In the Linux kernel, the following vulnerability has been resolved: io_uring/poll: add hash if ready poll request can't complete inline If we don't, then we may lose access to it completely, leading to a request leak. This will eventually stall the ring exit process as well.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed6.1.7-1package
linuxnot-affectedbullseyepackage

Примечания

  • https://git.kernel.org/linus/febb985c06cb6f5fac63598c0bffd4fd823d110d (6.2-rc4)

EPSS

Процентиль: 14%
0.00047
Низкий

Связанные уязвимости

CVSS3: 5.5
ubuntu
10 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: io_uring/poll: add hash if ready poll request can't complete inline If we don't, then we may lose access to it completely, leading to a request leak. This will eventually stall the ring exit process as well.

CVSS3: 5.5
redhat
10 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: io_uring/poll: add hash if ready poll request can't complete inline If we don't, then we may lose access to it completely, leading to a request leak. This will eventually stall the ring exit process as well.

CVSS3: 5.5
nvd
10 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: io_uring/poll: add hash if ready poll request can't complete inline If we don't, then we may lose access to it completely, leading to a request leak. This will eventually stall the ring exit process as well.

CVSS3: 5.5
github
10 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: io_uring/poll: add hash if ready poll request can't complete inline If we don't, then we may lose access to it completely, leading to a request leak. This will eventually stall the ring exit process as well.

CVSS3: 5.5
fstec
больше 2 лет назад

Уязвимость компонента io_uring ядра операционной системы Linux, связанная с ошибками освобождения памяти, позволяющая нарушению вызвать отказ в обслуживании

EPSS

Процентиль: 14%
0.00047
Низкий