Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2024-10396

Опубликовано: 21 сент. 2023
Источник: fstec
CVSS3: 5.5
CVSS2: 4.6

Описание

Уязвимость функции qd_check_sync() компонента imon ядра операционных систем Linux связана с неконтролируемым достижимым утверждением. Эксплуатация уязвимости может позволить нарушителю вызвать отказ в обслуживании

Вендор

Novell Inc.
Red Hat Inc.
Сообщество свободного программного обеспечения
ООО «Ред Софт»

Наименование ПО

OpenSUSE Leap
Red Hat Enterprise Linux
Suse Linux Enterprise Server
SUSE Linux Enterprise Server for SAP Applications
Debian GNU/Linux
SUSE Linux Enterprise Workstation Extension
SUSE Linux Enterprise Live Patching
РЕД ОС
SUSE Manager Retail Branch Server
SUSE Manager Proxy
SUSE Manager Server
SUSE Linux Enterprise High Availability Extension
SUSE Linux Enterprise Micro
openSUSE Leap Micro
Suse Linux Enterprise Desktop
SUSE Linux Enterprise High Performance Computing
SUSE Linux Enterprise Module for Basesystem
SUSE Linux Enterprise Module for Development Tools
SUSE Linux Enterprise Module for Public Cloud
SUSE Linux Enterprise Real Time
SUSE Linux Enterprise Module for Legacy Software
SUSE Real Time Module
Linux

Версия ПО

15.5 (OpenSUSE Leap)
8 (Red Hat Enterprise Linux)
12 SP5 (Suse Linux Enterprise Server)
12 SP5 (SUSE Linux Enterprise Server for SAP Applications)
10 (Debian GNU/Linux)
12 SP5 (SUSE Linux Enterprise Workstation Extension)
12 SP5 (SUSE Linux Enterprise Live Patching)
11 (Debian GNU/Linux)
12 (Debian GNU/Linux)
7.3 (РЕД ОС)
9 (Red Hat Enterprise Linux)
4.3 (SUSE Manager Retail Branch Server)
4.3 (SUSE Manager Proxy)
4.3 (SUSE Manager Server)
12 SP5 (SUSE Linux Enterprise High Availability Extension)
5.3 (SUSE Linux Enterprise Micro)
5.3 (openSUSE Leap Micro)
15 SP4 (SUSE Linux Enterprise Live Patching)
15 SP4 (SUSE Linux Enterprise High Availability Extension)
15 SP5 (SUSE Linux Enterprise Server for SAP Applications)
15 SP5 (Suse Linux Enterprise Server)
15 SP5 (Suse Linux Enterprise Desktop)
15 SP5 (SUSE Linux Enterprise High Performance Computing)
15 SP5 (SUSE Linux Enterprise Module for Basesystem)
15 SP5 (SUSE Linux Enterprise Module for Development Tools)
15 SP5 (SUSE Linux Enterprise Module for Public Cloud)
15 SP5 (SUSE Linux Enterprise Real Time)
5.4 (SUSE Linux Enterprise Micro)
15 SP5 (SUSE Linux Enterprise Module for Legacy Software)
12 SP5 (SUSE Linux Enterprise Real Time)
5.4 (openSUSE Leap Micro)
15 SP5 (SUSE Linux Enterprise Live Patching)
15 SP5 (SUSE Linux Enterprise Workstation Extension)
5.5 (SUSE Linux Enterprise Micro)
5.5 (openSUSE Leap Micro)
15 SP4-ESPOS (SUSE Linux Enterprise High Performance Computing)
15 SP4-LTSS (SUSE Linux Enterprise High Performance Computing)
15 SP4-LTSS (Suse Linux Enterprise Server)
15 SP5 (SUSE Real Time Module)
15 SP6 (Suse Linux Enterprise Desktop)
15 SP6 (SUSE Linux Enterprise Server for SAP Applications)
15 SP6 (SUSE Linux Enterprise High Performance Computing)
15 SP6 (SUSE Linux Enterprise Module for Basesystem)
15 SP6 (SUSE Linux Enterprise Workstation Extension)
15.6 (OpenSUSE Leap)
15 SP6 (SUSE Linux Enterprise Module for Development Tools)
15 SP5 (SUSE Linux Enterprise High Availability Extension)
15 SP6 (SUSE Linux Enterprise Module for Legacy Software)
от 6.6 до 6.6.3 (Linux)
15 SP6 (SUSE Linux Enterprise High Availability Extension)
15 SP6 (SUSE Linux Enterprise Live Patching)
15 SP6 (SUSE Linux Enterprise Module for Public Cloud)
15 SP6 (SUSE Linux Enterprise Real Time)
15 SP6 (SUSE Real Time Module)
от 4.14 др 4.14.331 (Linux)
от 4.19 до 4.19.300 (Linux)
от 5.10 до 5.10.202 (Linux)
от 5.15 до 5.15.140 (Linux)
от 5.4 до 5.4.262 (Linux)
от 6.1 до 6.1.64 (Linux)
от 6.5 до 6.5.13 (Linux)
6.7 rc1 (Linux)
6.1 (SUSE Linux Enterprise Micro)

Тип ПО

Операционная система
Прикладное ПО информационных систем
Сетевое средство

Операционные системы и аппаратные платформы

Novell Inc. OpenSUSE Leap 15.5
Red Hat Inc. Red Hat Enterprise Linux 8
Novell Inc. Suse Linux Enterprise Server 12 SP5
Novell Inc. SUSE Linux Enterprise Server for SAP Applications 12 SP5
Сообщество свободного программного обеспечения Debian GNU/Linux 10
Сообщество свободного программного обеспечения Debian GNU/Linux 11
Сообщество свободного программного обеспечения Debian GNU/Linux 12
ООО «Ред Софт» РЕД ОС 7.3
Red Hat Inc. Red Hat Enterprise Linux 9
Novell Inc. openSUSE Leap Micro 5.3
Novell Inc. SUSE Linux Enterprise Server for SAP Applications 15 SP5
Novell Inc. Suse Linux Enterprise Server 15 SP5
Novell Inc. Suse Linux Enterprise Desktop 15 SP5
Novell Inc. SUSE Linux Enterprise Real Time 15 SP5
Novell Inc. SUSE Linux Enterprise Real Time 12 SP5
Novell Inc. openSUSE Leap Micro 5.4
Novell Inc. openSUSE Leap Micro 5.5
Novell Inc. Suse Linux Enterprise Server 15 SP4-LTSS
Novell Inc. Suse Linux Enterprise Desktop 15 SP6
Novell Inc. SUSE Linux Enterprise Server for SAP Applications 15 SP6
Novell Inc. OpenSUSE Leap 15.6
Сообщество свободного программного обеспечения Linux от 6.6 до 6.6.3
Novell Inc. SUSE Linux Enterprise Real Time 15 SP6
Сообщество свободного программного обеспечения Linux от 4.14 др 4.14.331
Сообщество свободного программного обеспечения Linux от 4.19 до 4.19.300
Сообщество свободного программного обеспечения Linux от 5.10 до 5.10.202
Сообщество свободного программного обеспечения Linux от 5.15 до 5.15.140
Сообщество свободного программного обеспечения Linux от 5.4 до 5.4.262
Сообщество свободного программного обеспечения Linux от 6.1 до 6.1.64
Сообщество свободного программного обеспечения Linux от 6.5 до 6.5.13
Сообщество свободного программного обеспечения Linux 6.7 rc1

Уровень опасности уязвимости

Средний уровень опасности (базовая оценка CVSS 2.0 составляет 4,6)
Средний уровень опасности (базовая оценка CVSS 3.0 составляет 5,5)

Возможные меры по устранению уязвимости

Использование рекомендаций:
Для Linux:
https://git.kernel.org/stable/c/119565e566f91ff3588ffcd5812f0c8061586c6b
https://git.kernel.org/stable/c/1c28dace66015b675a343b89b0c87abbfda05ff4
https://git.kernel.org/stable/c/212f112fe5e90e98eb8d48585682880dae139f4c
https://git.kernel.org/stable/c/2a054b87a1b799b391e578597a42ee6e57a987ae
https://git.kernel.org/stable/c/2bb42a27a92ff3984c9fa5fbe128eced3ea693f2
https://git.kernel.org/stable/c/4c6a08125f2249531ec01783a5f4317d7342add5
https://git.kernel.org/stable/c/50e33567bc4a1c4ed79a1d289fe93c9a26491848
https://git.kernel.org/stable/c/53fc16c1ad84f5467ec24341670b63aa759335d3
https://git.kernel.org/stable/c/5bfda356e903633d16ae1bac1ee38364e12628a3
https://git.kernel.org/stable/c/b4deec69fe32b58dc5fb4ace52456ece85b75561
Для РедОС:
http://repo.red-soft.ru/redos/7.3c/x86_64/updates/
Для программных продуктов Novell Inc.:
https://www.suse.com/security/cve/CVE-2023-52865.html
Для Debian GNU/Linux:
https://security-tracker.debian.org/tracker/CVE-2023-52759
Для программных продуктов Red Hat Inc.:
https://access.redhat.com/security/cve/cve-2023-52759

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

5.5 Medium

CVSS3

4.6 Medium

CVSS2

Связанные уязвимости

ubuntu
около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: gfs2: ignore negated quota changes When lots of quota changes are made, there may be cases in which an inode's quota information is increased and then decreased, such as when blocks are added to a file, then deleted from it. If the timing is right, function do_qc can add pending quota changes to a transaction, then later, another call to do_qc can negate those changes, resulting in a net gain of 0. The quota_change information is recorded in the qc buffer (and qd element of the inode as well). The buffer is added to the transaction by the first call to do_qc, but a subsequent call changes the value from non-zero back to zero. At that point it's too late to remove the buffer_head from the transaction. Later, when the quota sync code is called, the zero-change qd element is discovered and flagged as an assert warning. If the fs is mounted with errors=panic, the kernel will panic. This is usually seen when files are tr...

CVSS3: 5.5
redhat
около 1 года назад

[REJECTED CVE] In the Linux kernel, the following vulnerability has been resolved: gfs2: ignore negated quota changes The Linux kernel CVE team has assigned CVE-2023-52759 to this issue.

nvd
около 1 года назад

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

github
около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: gfs2: ignore negated quota changes When lots of quota changes are made, there may be cases in which an inode's quota information is increased and then decreased, such as when blocks are added to a file, then deleted from it. If the timing is right, function do_qc can add pending quota changes to a transaction, then later, another call to do_qc can negate those changes, resulting in a net gain of 0. The quota_change information is recorded in the qc buffer (and qd element of the inode as well). The buffer is added to the transaction by the first call to do_qc, but a subsequent call changes the value from non-zero back to zero. At that point it's too late to remove the buffer_head from the transaction. Later, when the quota sync code is called, the zero-change qd element is discovered and flagged as an assert warning. If the fs is mounted with errors=panic, the kernel will panic. This is usually seen when files are...

CVSS3: 8.8
redos
7 месяцев назад

Множественные уязвимости kernel-lt

5.5 Medium

CVSS3

4.6 Medium

CVSS2