CVE-2023-53081 (GCVE-0-2023-53081)
Vulnerability from cvelistv5
Published
2025-05-02 15:55
Modified
2025-05-04 12:50
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: ocfs2: fix data corruption after failed write When buffered write fails to copy data into underlying page cache page, ocfs2_write_end_nolock() just zeroes out and dirties the page. This can leave dirty page beyond EOF and if page writeback tries to write this page before write succeeds and expands i_size, page gets into inconsistent state where page dirty bit is clear but buffer dirty bits stay set resulting in page data never getting written and so data copied to the page is lost. Fix the problem by invalidating page beyond EOF after failed write.
Impacted products
Vendor Product Version
Linux Linux Version: 7ed80e77c908cbaa686529a49f8ae0060c5caee7
Version: 7ce2b16bad2cbfa3fa7bbc42c4448914f639ca47
Version: f8a6a2ed4b7d1c3c8631eeb6d00572bc853094a8
Version: 6dbf7bb555981fb5faf7b691e8f6169fc2b2e63b
Version: 6dbf7bb555981fb5faf7b691e8f6169fc2b2e63b
Version: 6dbf7bb555981fb5faf7b691e8f6169fc2b2e63b
Version: 6dbf7bb555981fb5faf7b691e8f6169fc2b2e63b
Version: 6dbf7bb555981fb5faf7b691e8f6169fc2b2e63b
Version: acef5107e2eacb08a16ad5db60320d65bd26a6c0
Version: 36ed9e604215f58cec0381ca5fcc6da05f2d87ca
Create a notification for this product.
   Linux Linux Version: 5.10
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "fs/ocfs2/aops.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "1629f6f522b2d058019710466a84b240683bbee3",
              "status": "affected",
              "version": "7ed80e77c908cbaa686529a49f8ae0060c5caee7",
              "versionType": "git"
            },
            {
              "lessThan": "c26f3ff4c0be590c1250f945ac2e4fc5fcdc5f45",
              "status": "affected",
              "version": "7ce2b16bad2cbfa3fa7bbc42c4448914f639ca47",
              "versionType": "git"
            },
            {
              "lessThan": "4c24eb49ab44351424ac8fe8567f91ea48a06089",
              "status": "affected",
              "version": "f8a6a2ed4b7d1c3c8631eeb6d00572bc853094a8",
              "versionType": "git"
            },
            {
              "lessThan": "91d7a4bd5656552d6259e2d0f8859f9e8cc5ef68",
              "status": "affected",
              "version": "6dbf7bb555981fb5faf7b691e8f6169fc2b2e63b",
              "versionType": "git"
            },
            {
              "lessThan": "a9e53869cb43c96d6d851c491fd4e26430ab6ba6",
              "status": "affected",
              "version": "6dbf7bb555981fb5faf7b691e8f6169fc2b2e63b",
              "versionType": "git"
            },
            {
              "lessThan": "47eb055ad3588fc96d34e9e1dd87b210ce62906b",
              "status": "affected",
              "version": "6dbf7bb555981fb5faf7b691e8f6169fc2b2e63b",
              "versionType": "git"
            },
            {
              "lessThan": "205759c6c18f54659b0b5976b14a52d1b3eb9f57",
              "status": "affected",
              "version": "6dbf7bb555981fb5faf7b691e8f6169fc2b2e63b",
              "versionType": "git"
            },
            {
              "lessThan": "90410bcf873cf05f54a32183afff0161f44f9715",
              "status": "affected",
              "version": "6dbf7bb555981fb5faf7b691e8f6169fc2b2e63b",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "acef5107e2eacb08a16ad5db60320d65bd26a6c0",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "36ed9e604215f58cec0381ca5fcc6da05f2d87ca",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "fs/ocfs2/aops.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "5.10"
            },
            {
              "lessThan": "5.10",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.14.*",
              "status": "unaffected",
              "version": "4.14.312",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.19.*",
              "status": "unaffected",
              "version": "4.19.280",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.*",
              "status": "unaffected",
              "version": "5.4.240",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.177",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.105",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.21",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.2.*",
              "status": "unaffected",
              "version": "6.2.8",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.3",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.14.312",
                  "versionStartIncluding": "4.14.204",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.19.280",
                  "versionStartIncluding": "4.19.155",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.4.240",
                  "versionStartIncluding": "5.4.75",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.10.177",
                  "versionStartIncluding": "5.10",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.15.105",
                  "versionStartIncluding": "5.10",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.1.21",
                  "versionStartIncluding": "5.10",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.2.8",
                  "versionStartIncluding": "5.10",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.3",
                  "versionStartIncluding": "5.10",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "4.9.242",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "5.9.5",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: fix data corruption after failed write\n\nWhen buffered write fails to copy data into underlying page cache page,\nocfs2_write_end_nolock() just zeroes out and dirties the page.  This can\nleave dirty page beyond EOF and if page writeback tries to write this page\nbefore write succeeds and expands i_size, page gets into inconsistent\nstate where page dirty bit is clear but buffer dirty bits stay set\nresulting in page data never getting written and so data copied to the\npage is lost.  Fix the problem by invalidating page beyond EOF after\nfailed write."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-04T12:50:20.030Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/1629f6f522b2d058019710466a84b240683bbee3"
        },
        {
          "url": "https://git.kernel.org/stable/c/c26f3ff4c0be590c1250f945ac2e4fc5fcdc5f45"
        },
        {
          "url": "https://git.kernel.org/stable/c/4c24eb49ab44351424ac8fe8567f91ea48a06089"
        },
        {
          "url": "https://git.kernel.org/stable/c/91d7a4bd5656552d6259e2d0f8859f9e8cc5ef68"
        },
        {
          "url": "https://git.kernel.org/stable/c/a9e53869cb43c96d6d851c491fd4e26430ab6ba6"
        },
        {
          "url": "https://git.kernel.org/stable/c/47eb055ad3588fc96d34e9e1dd87b210ce62906b"
        },
        {
          "url": "https://git.kernel.org/stable/c/205759c6c18f54659b0b5976b14a52d1b3eb9f57"
        },
        {
          "url": "https://git.kernel.org/stable/c/90410bcf873cf05f54a32183afff0161f44f9715"
        }
      ],
      "title": "ocfs2: fix data corruption after failed write",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2023-53081",
    "datePublished": "2025-05-02T15:55:30.453Z",
    "dateReserved": "2025-05-02T15:51:43.549Z",
    "dateUpdated": "2025-05-04T12:50:20.030Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2023-53081\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-05-02T16:15:27.117\",\"lastModified\":\"2025-05-05T20:54:45.973\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nocfs2: fix data corruption after failed write\\n\\nWhen buffered write fails to copy data into underlying page cache page,\\nocfs2_write_end_nolock() just zeroes out and dirties the page.  This can\\nleave dirty page beyond EOF and if page writeback tries to write this page\\nbefore write succeeds and expands i_size, page gets into inconsistent\\nstate where page dirty bit is clear but buffer dirty bits stay set\\nresulting in page data never getting written and so data copied to the\\npage is lost.  Fix the problem by invalidating page beyond EOF after\\nfailed write.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ocfs2: se corrige la corrupci\u00f3n de datos tras una escritura fallida. Cuando una escritura en b\u00fafer no copia los datos en la p\u00e1gina de cach\u00e9 de la p\u00e1gina subyacente, ocfs2_write_end_nolock() simplemente pone a cero y contamina la p\u00e1gina. Esto puede dejar una p\u00e1gina contaminada m\u00e1s all\u00e1 del EOF. Si la escritura diferida intenta escribir en esta p\u00e1gina antes de que la escritura tenga \u00e9xito y expande i_size, la p\u00e1gina entra en un estado inconsistente donde el bit de p\u00e1gina contaminada se borra, pero los bits de b\u00fafer contaminados permanecen activos, lo que resulta en que los datos de la p\u00e1gina nunca se escriban y, por lo tanto, se pierdan los datos copiados. Se soluciona el problema invalidando la p\u00e1gina m\u00e1s all\u00e1 del EOF tras una escritura fallida.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/1629f6f522b2d058019710466a84b240683bbee3\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/205759c6c18f54659b0b5976b14a52d1b3eb9f57\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/47eb055ad3588fc96d34e9e1dd87b210ce62906b\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/4c24eb49ab44351424ac8fe8567f91ea48a06089\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/90410bcf873cf05f54a32183afff0161f44f9715\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/91d7a4bd5656552d6259e2d0f8859f9e8cc5ef68\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/a9e53869cb43c96d6d851c491fd4e26430ab6ba6\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/c26f3ff4c0be590c1250f945ac2e4fc5fcdc5f45\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…