Bug 2268329 (CVE-2023-52588)
Summary: | CVE-2023-52588 kernel: f2fs: fix to tag gcing flag on page during block migration | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Zack Miele <zmiele> |
Component: | vulnerability | Assignee: | Product Security <prodsec-ir-bot> |
Status: | NEW --- | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | acaringi, allarkin, aquini, bhu, chwhite, cye, cyin, dbohanno, debarbos, dfreiber, drow, dvlasenk, esandeen, ezulian, hkrzesin, jarod, jburrell, jdenham, jfaracco, jforbes, jlelli, joe.lawrence, jshortt, jstancek, jwyatt, kcarcia, ldoskova, lgoncalv, lzampier, mleitner, mmilgram, mstowell, nmurray, ptalbert, rparrazo, rrobaina, rvrbovsk, rysulliv, scweaver, sidakwo, sukulkar, tglozar, tyberry, vkumar, wcosta, williams, wmealing, ycote, ykopkova, zhijwang |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | kernel 5.15.149, kernel 6.1.77, kernel 6.6.16, kernel 6.7.4, kernel 6.8-rc1 | Doc Type: | If docs needed, set a value |
Doc Text: |
A vulnerability was found in the Linux kernel's f2fs component, caused by a missing gflag on a page during block migration, something that is necessary to guarantee migrate data is persisted during checkpoint. Without this flag, it is possible that the data may not be properly persisted and can lead to data corruption after a sudden power-off recovery (SPOR).
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | Type: | --- | |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2268330 | ||
Bug Blocks: | 2268346 |
Description
Zack Miele
2024-03-06 22:26:46 UTC
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 2268330] This was fixed for Fedora with the 6.7.4 stable kernel updates. The result of automatic check (that is developed by Alexander Larkin) for this CVE-2023-52588 is: SKIP No affected files built, so skip this CVE NO - - unknown (where first YES/NO value means if related sources built). |