Bug 2405743 (CVE-2023-53692)
| Summary: | CVE-2023-53692 kernel: ext4: fix use-after-free read in ext4_find_extent for bigalloc + inline | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | OSIDB Bzimport <bzimport> |
| Component: | vulnerability | Assignee: | Product Security DevOps Team <prodsec-dev> |
| Status: | NEW --- | QA Contact: | |
| Severity: | medium | Docs Contact: | |
| Priority: | medium | ||
| Version: | unspecified | Keywords: | Security |
| Target Milestone: | --- | ||
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | --- | |
| Doc Text: |
A flaw was discovered in the ext4 filesystem implementation in the Linux kernel. When a filesystem is created or used with both the bigalloc and inline data features enabled, under specific conditions, the function ext4_find_extent() may execute a use-after-free read (because inline data was converted to an extent but the flag wasn’t set). This can lead to memory corruption or instability when writing to files on the ext4 filesystem.
|
Story Points: | --- |
| Clone Of: | Environment: | ||
| Last Closed: | Type: | --- | |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
|
Description
OSIDB Bzimport
2025-10-22 14:03:48 UTC
|