CVE-2023-52444

CVSS v3.1 7.8 (High)
78% Progress
EPSS 0.04 % (5th)
0.04% Progress
Affected Products 1
Advisories 20
NVD Status Modified

In the Linux kernel, the following vulnerability has been resolved:

f2fs: fix to avoid dirent corruption

As Al reported in link[1]:

f2fs_rename()
...
if (old_dir != new_dir && !whiteout)
f2fs_set_link(old_inode, old_dir_entry,
old_dir_page, new_dir);
else
f2fs_put_page(old_dir_page, 0);

You want correct inumber in the ".." link. And cross-directory
rename does move the source to new parent, even if you'd been asked
to leave a whiteout in the old place.

[1] https://lore.kernel.org/all/20231017055040.GN800259@ZenIV/

With below testcase, it may cause dirent corruption, due to it missed
to call f2fs_set_link() to update ".." link to new directory.
- mkdir -p dir/foo
- renameat2 -w dir/foo bar

ASSERT --> Bad inode number[0x4] for '..', parent parent ino is [0x3]
[FSCK] other corrupted bugs [Fail]

Weaknesses
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE Status
PUBLISHED
NVD Status
Modified
CNA
kernel.org
Published Date
2024-02-22 17:15:08
(6 months ago)
Updated Date
2024-06-27 12:15:14
(2 months ago)

Affected Products

Loading...
Loading...
Loading...

Configuration #1

    CPE23 From Up To
  Linux Kernel from 4.2.0 version and prior 4.19.306 version cpe:2.3:o:linux:linux_kernel >= 4.2.0 < 4.19.306
  Linux Kernel from 4.20 version and prior 5.4.268 version cpe:2.3:o:linux:linux_kernel >= 4.20 < 5.4.268
  Linux Kernel from 5.5.0 version and prior 5.10.209 version cpe:2.3:o:linux:linux_kernel >= 5.5.0 < 5.10.209
  Linux Kernel from 5.11.0 version and prior 5.15.148 version cpe:2.3:o:linux:linux_kernel >= 5.11.0 < 5.15.148
  Linux Kernel from 5.16.0 version and prior 6.1.75 version cpe:2.3:o:linux:linux_kernel >= 5.16.0 < 6.1.75
  Linux Kernel from 6.2.0 version and prior 6.6.14 version cpe:2.3:o:linux:linux_kernel >= 6.2.0 < 6.6.14
  Linux Kernel from 6.7.0 version and prior 6.7.2 version cpe:2.3:o:linux:linux_kernel >= 6.7.0 < 6.7.2
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...