CVE-2023-2124

An out-of-bounds memory access flaw was found in the Linux kernel’s XFS file system in how a user restores an XFS image after failure (with a dirty log journal). This flaw allows a local user to crash or potentially escalate their privileges on the system.
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:57

Type Values Removed Values Added
References () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/fs/xfs/xfs_buf_item_recover.c?h=v6.4-rc1&id=22ed903eee23a5b174e240f1cdfa9acf393a5210 - Mailing List, Patch, Vendor Advisory () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/fs/xfs/xfs_buf_item_recover.c?h=v6.4-rc1&id=22ed903eee23a5b174e240f1cdfa9acf393a5210 - Mailing List, Patch, Vendor Advisory
References () https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html - Mailing List, Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20230622-0010/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20230622-0010/ - Third Party Advisory
References () https://syzkaller.appspot.com/bug?extid=7e9494b8b399902e994e - Exploit, Mailing List, Third Party Advisory () https://syzkaller.appspot.com/bug?extid=7e9494b8b399902e994e - Exploit, Mailing List, Third Party Advisory
References () https://www.debian.org/security/2023/dsa-5448 - Third Party Advisory () https://www.debian.org/security/2023/dsa-5448 - Third Party Advisory
References () https://www.debian.org/security/2023/dsa-5480 - Third Party Advisory () https://www.debian.org/security/2023/dsa-5480 - Third Party Advisory

01 Feb 2024, 01:35

Type Values Removed Values Added
References (DEBIAN) https://www.debian.org/security/2023/dsa-5480 - (DEBIAN) https://www.debian.org/security/2023/dsa-5480 - Third Party Advisory
References (DEBIAN) https://www.debian.org/security/2023/dsa-5448 - (DEBIAN) https://www.debian.org/security/2023/dsa-5448 - Third Party Advisory
References (MISC) https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/fs/xfs/xfs_buf_item_recover.c?h=v6.4-rc1&id=22ed903eee23a5b174e240f1cdfa9acf393a5210 - Mailing List, Vendor Advisory (MISC) https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/fs/xfs/xfs_buf_item_recover.c?h=v6.4-rc1&id=22ed903eee23a5b174e240f1cdfa9acf393a5210 - Mailing List, Patch, Vendor Advisory
References (MISC) https://syzkaller.appspot.com/bug?extid=7e9494b8b399902e994e - (MISC) https://syzkaller.appspot.com/bug?extid=7e9494b8b399902e994e - Exploit, Mailing List, Third Party Advisory
References (MLIST) https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html - (MLIST) https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html - Mailing List, Third Party Advisory
References (CONFIRM) https://security.netapp.com/advisory/ntap-20230622-0010/ - (CONFIRM) https://security.netapp.com/advisory/ntap-20230622-0010/ - Third Party Advisory
CPE cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*
First Time Netapp h500s Firmware
Netapp h410c
Netapp h410s Firmware
Debian debian Linux
Netapp h300s
Netapp h500s
Netapp h700s
Debian
Netapp h410s
Netapp
Netapp h300s Firmware
Netapp h700s Firmware
Netapp h410c Firmware

20 Oct 2023, 00:15

Type Values Removed Values Added
References
  • (MLIST) https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html -

19 Aug 2023, 18:15

Type Values Removed Values Added
References
  • (DEBIAN) https://www.debian.org/security/2023/dsa-5480 -

06 Jul 2023, 04:15

Type Values Removed Values Added
References
  • (DEBIAN) https://www.debian.org/security/2023/dsa-5448 -

22 Jun 2023, 17:15

Type Values Removed Values Added
References
  • (CONFIRM) https://security.netapp.com/advisory/ntap-20230622-0010/ -

05 Jun 2023, 05:15

Type Values Removed Values Added
References
  • (MISC) https://syzkaller.appspot.com/bug?extid=7e9494b8b399902e994e -

Information

Published : 2023-05-15 22:15

Updated : 2024-11-21 07:57


NVD link : CVE-2023-2124

Mitre link : CVE-2023-2124

CVE.ORG link : CVE-2023-2124


JSON object : View

Products Affected

netapp

  • h700s
  • h300s
  • h300s_firmware
  • h410s_firmware
  • h410c_firmware
  • h500s
  • h410c
  • h700s_firmware
  • h410s
  • h500s_firmware

linux

  • linux_kernel

debian

  • debian_linux
CWE
CWE-787

Out-of-bounds Write