CVE-2023-52588

In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to tag gcing flag on page during block migration It needs to add missing gcing flag on page during block migration, in order to garantee migrated data be persisted during checkpoint, otherwise out-of-order persistency between data and node may cause data corruption after SPOR. Similar issue was fixed by commit 2d1fe8a86bf5 ("f2fs: fix to tag gcing flag on page during file defragment").
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

14 Feb 2025, 16:40

Type Values Removed Values Added
CWE NVD-CWE-noinfo
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.1
First Time Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/417b8a91f4e8831cadaf85c3f15c6991c1f54dde - () https://git.kernel.org/stable/c/417b8a91f4e8831cadaf85c3f15c6991c1f54dde - Mailing List, Patch
References () https://git.kernel.org/stable/c/4961acdd65c956e97c1a000c82d91a8c1cdbe44b - () https://git.kernel.org/stable/c/4961acdd65c956e97c1a000c82d91a8c1cdbe44b - Mailing List, Patch
References () https://git.kernel.org/stable/c/7c972c89457511007dfc933814c06786905e515c - () https://git.kernel.org/stable/c/7c972c89457511007dfc933814c06786905e515c - Mailing List, Patch
References () https://git.kernel.org/stable/c/7ea0f29d9fd84905051be020c0df7d557e286136 - () https://git.kernel.org/stable/c/7ea0f29d9fd84905051be020c0df7d557e286136 - Mailing List, Patch
References () https://git.kernel.org/stable/c/b8094c0f1aae329b1c60a275a780d6c2c9ff7aa3 - () https://git.kernel.org/stable/c/b8094c0f1aae329b1c60a275a780d6c2c9ff7aa3 - Mailing List, Patch

21 Nov 2024, 08:40

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/417b8a91f4e8831cadaf85c3f15c6991c1f54dde - () https://git.kernel.org/stable/c/417b8a91f4e8831cadaf85c3f15c6991c1f54dde -
References () https://git.kernel.org/stable/c/4961acdd65c956e97c1a000c82d91a8c1cdbe44b - () https://git.kernel.org/stable/c/4961acdd65c956e97c1a000c82d91a8c1cdbe44b -
References () https://git.kernel.org/stable/c/7c972c89457511007dfc933814c06786905e515c - () https://git.kernel.org/stable/c/7c972c89457511007dfc933814c06786905e515c -
References () https://git.kernel.org/stable/c/7ea0f29d9fd84905051be020c0df7d557e286136 - () https://git.kernel.org/stable/c/7ea0f29d9fd84905051be020c0df7d557e286136 -
References () https://git.kernel.org/stable/c/b8094c0f1aae329b1c60a275a780d6c2c9ff7aa3 - () https://git.kernel.org/stable/c/b8094c0f1aae329b1c60a275a780d6c2c9ff7aa3 -

06 Mar 2024, 15:18

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-06 07:15

Updated : 2025-02-14 16:40


NVD link : CVE-2023-52588

Mitre link : CVE-2023-52588

CVE.ORG link : CVE-2023-52588


JSON object : View

Products Affected

linux

  • linux_kernel