An issue was discovered in the Linux kernel before 6.3.3. There is an out-of-bounds read in crc16 in lib/crc16.c when called from fs/ext4/super.c because ext4_group_desc_csum does not properly check an offset. NOTE: this is disputed by third parties because the kernel is not intended to defend against attackers with the stated "When modifying the block device while it is mounted by the filesystem" access.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 08:06
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugzilla.suse.com/show_bug.cgi?id=1211895 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.3 - Mailing List, Patch | |
References | () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4f04351888a83e595571de672e0a4a8b74f4fb31 - Mailing List, Patch | |
References | () https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html - Mailing List, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html - Mailing List, Third Party Advisory | |
References | () https://syzkaller.appspot.com/bug?extid=8785e41224a3afd04321 - Mailing List, Patch |
Information
Published : 2023-05-31 20:15
Updated : 2025-03-11 16:15
NVD link : CVE-2023-34256
Mitre link : CVE-2023-34256
CVE.ORG link : CVE-2023-34256
JSON object : View
Products Affected
debian
- debian_linux
suse
- linux_enterprise
linux
- linux_kernel
CWE
CWE-125
Out-of-bounds Read