{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-2612","assignerOrgId":"cc1ad9ee-3454-478d-9317-d3e869d708bc","state":"PUBLISHED","assignerShortName":"canonical","dateReserved":"2023-05-10T01:02:51.624Z","datePublished":"2023-05-30T23:12:29.867Z","dateUpdated":"2025-02-13T16:44:50.457Z"},"containers":{"cna":{"affected":[{"collectionURL":"https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/kinetic/refs/","packageName":"ubuntu-linux","platforms":["Linux"],"product":"ubuntu-linux","repo":"https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/kinetic/","vendor":"Canonical Ltd.","versions":[{"status":"affected","version":"0","lessThan":"02b47547824b1cd0d55c6744f91886f04de8947e","versionType":"commit"}]}],"credits":[{"lang":"en","type":"finder","value":"Jean-Baptiste Cayrou"}],"datePublic":"2023-05-30T00:00:00.000Z","descriptions":[{"lang":"en","value":"Jean-Baptiste Cayrou discovered that the shiftfs file system in the Ubuntu Linux kernel contained a race condition when handling inode locking in some situations. A local attacker could use this to cause a denial of service (kernel deadlock)."}],"impacts":[{"capecId":"CAPEC-25","descriptions":[{"lang":"en","value":"CAPEC-25"}]}],"metrics":[{"cvssV3_1":{"version":"3.1","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseSeverity":"MEDIUM","baseScore":4.4,"vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},"format":"CVSS"}],"problemTypes":[{"descriptions":[{"cweId":"CWE-667","description":"CWE-667","lang":"en","type":"CWE"}]}],"references":[{"tags":["patch"],"url":"https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/kinetic/commit/?id=02b47547824b1cd0d55c6744f91886f04de8947e"},{"tags":["vendor-advisory"],"url":"https://ubuntu.com/security/CVE-2023-2612"},{"tags":["vendor-advisory"],"url":"https://ubuntu.com/security/notices/USN-6122-1"},{"tags":["vendor-advisory"],"url":"https://ubuntu.com/security/notices/USN-6123-1"},{"tags":["vendor-advisory"],"url":"https://ubuntu.com/security/notices/USN-6124-1"},{"tags":["vendor-advisory"],"url":"https://ubuntu.com/security/notices/USN-6127-1"},{"url":"http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html"}],"title":"shiftfs lock unbalance in Ubuntu-specific kernels","providerMetadata":{"orgId":"cc1ad9ee-3454-478d-9317-d3e869d708bc","shortName":"canonical","dateUpdated":"2023-06-22T14:06:39.212Z"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T06:26:09.708Z"},"title":"CVE Program Container","references":[{"tags":["patch","x_transferred"],"url":"https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/kinetic/commit/?id=02b47547824b1cd0d55c6744f91886f04de8947e"},{"tags":["vendor-advisory","x_transferred"],"url":"https://ubuntu.com/security/CVE-2023-2612"},{"tags":["vendor-advisory","x_transferred"],"url":"https://ubuntu.com/security/notices/USN-6122-1"},{"tags":["vendor-advisory","x_transferred"],"url":"https://ubuntu.com/security/notices/USN-6123-1"},{"tags":["vendor-advisory","x_transferred"],"url":"https://ubuntu.com/security/notices/USN-6124-1"},{"tags":["vendor-advisory","x_transferred"],"url":"https://ubuntu.com/security/notices/USN-6127-1"},{"url":"http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-01-10T16:47:19.729691Z","id":"CVE-2023-2612","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-01-10T16:48:03.535Z"}}]}}