CVE-2023-52583

In the Linux kernel, the following vulnerability has been resolved: ceph: fix deadlock or deadcode of misusing dget() The lock order is incorrect between denty and its parent, we should always make sure that the parent get the lock first. But since this deadcode is never used and the parent dir will always be set from the callers, let's just remove it.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

03 Feb 2025, 14:18

Type Values Removed Values Added
CPE cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
First Time Debian debian Linux
Debian

03 Feb 2025, 14:11

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/196b87e5c00ce021e164a5de0f0d04f4116a9160 - () https://git.kernel.org/stable/c/196b87e5c00ce021e164a5de0f0d04f4116a9160 - Patch
References () https://git.kernel.org/stable/c/6ab4fd508fad942f1f1ba940492f2735e078e980 - () https://git.kernel.org/stable/c/6ab4fd508fad942f1f1ba940492f2735e078e980 - Patch
References () https://git.kernel.org/stable/c/76cb2aa3421fee4fde706dec41b1344bc0a9ad67 - () https://git.kernel.org/stable/c/76cb2aa3421fee4fde706dec41b1344bc0a9ad67 - Patch
References () https://git.kernel.org/stable/c/7f2649c94264d00df6b6ac27161e9f4372a3450e - () https://git.kernel.org/stable/c/7f2649c94264d00df6b6ac27161e9f4372a3450e - Patch
References () https://git.kernel.org/stable/c/a9c15d6e8aee074fae66c04d114f20b84274fcca - () https://git.kernel.org/stable/c/a9c15d6e8aee074fae66c04d114f20b84274fcca - Patch
References () https://git.kernel.org/stable/c/b493ad718b1f0357394d2cdecbf00a44a36fa085 - () https://git.kernel.org/stable/c/b493ad718b1f0357394d2cdecbf00a44a36fa085 - Patch
References () https://git.kernel.org/stable/c/e016e358461b89b231626fcf78c5c38e35c44fd3 - () https://git.kernel.org/stable/c/e016e358461b89b231626fcf78c5c38e35c44fd3 - Patch
References () https://git.kernel.org/stable/c/eb55ba8aa7fb7aad54f40fbf4d8dcdfdba0bebf6 - () https://git.kernel.org/stable/c/eb55ba8aa7fb7aad54f40fbf4d8dcdfdba0bebf6 - Patch
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Mailing List
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - Mailing List
CWE CWE-667
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux linux Kernel
Linux

21 Nov 2024, 08:40

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html -
References () https://git.kernel.org/stable/c/196b87e5c00ce021e164a5de0f0d04f4116a9160 - () https://git.kernel.org/stable/c/196b87e5c00ce021e164a5de0f0d04f4116a9160 -
References () https://git.kernel.org/stable/c/6ab4fd508fad942f1f1ba940492f2735e078e980 - () https://git.kernel.org/stable/c/6ab4fd508fad942f1f1ba940492f2735e078e980 -
References () https://git.kernel.org/stable/c/76cb2aa3421fee4fde706dec41b1344bc0a9ad67 - () https://git.kernel.org/stable/c/76cb2aa3421fee4fde706dec41b1344bc0a9ad67 -
References () https://git.kernel.org/stable/c/7f2649c94264d00df6b6ac27161e9f4372a3450e - () https://git.kernel.org/stable/c/7f2649c94264d00df6b6ac27161e9f4372a3450e -
References () https://git.kernel.org/stable/c/a9c15d6e8aee074fae66c04d114f20b84274fcca - () https://git.kernel.org/stable/c/a9c15d6e8aee074fae66c04d114f20b84274fcca -
References () https://git.kernel.org/stable/c/b493ad718b1f0357394d2cdecbf00a44a36fa085 - () https://git.kernel.org/stable/c/b493ad718b1f0357394d2cdecbf00a44a36fa085 -
References () https://git.kernel.org/stable/c/e016e358461b89b231626fcf78c5c38e35c44fd3 - () https://git.kernel.org/stable/c/e016e358461b89b231626fcf78c5c38e35c44fd3 -
References () https://git.kernel.org/stable/c/eb55ba8aa7fb7aad54f40fbf4d8dcdfdba0bebf6 - () https://git.kernel.org/stable/c/eb55ba8aa7fb7aad54f40fbf4d8dcdfdba0bebf6 -

04 Nov 2024, 13:16

Type Values Removed Values Added
References
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}

27 Jun 2024, 13:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html -

25 Jun 2024, 23:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -

06 Mar 2024, 07:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-06 07:15

Updated : 2025-02-03 14:18


NVD link : CVE-2023-52583

Mitre link : CVE-2023-52583

CVE.ORG link : CVE-2023-52583


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-667

Improper Locking