Bug 1225042 (CVE-2023-52824) - VUL-0: REJECTED: CVE-2023-52824: kernel: kernel: watch_queue: copy user-array safely
Summary: VUL-0: REJECTED: CVE-2023-52824: kernel: kernel: watch_queue: copy user-array...
Status: RESOLVED INVALID
Alias: CVE-2023-52824
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/406928/
Whiteboard: CVSSv3.1:SUSE:CVE-2023-52824:4.4:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2024-05-22 15:13 UTC by SMASH SMASH
Modified: 2024-05-24 15:45 UTC (History)
4 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Comment 1 Michal Hocko 2024-05-23 15:16:15 UTC
This is not a security bug but rather a security fortification. It depends on ca0776571d31.

I think we can leave it out as WONTFIX.
Comment 2 Michal Hocko 2024-05-24 12:10:43 UTC
Besides that as pointed by Jiri Bohac, this is not really necessary as the range check is done properly here.
Comment 3 Andrea Mattiazzo 2024-05-24 15:45:15 UTC
CVE is rejected: https://lore.kernel.org/linux-cve-announce/2024052415-REJECTED-6782@gregkh/