-

CVE-2023-54021

In the Linux kernel, the following vulnerability has been resolved:

ext4: set goal start correctly in ext4_mb_normalize_request

We need to set ac_g_ex to notify the goal start used in
ext4_mb_find_by_goal. Set ac_g_ex instead of ac_f_ex in
ext4_mb_normalize_request.
Besides we should assure goal start is in range [first_data_block,
blocks_count) as ext4_mb_initialize_context does.

[ Added a check to make sure size is less than ar->pright; otherwise
  we could end up passing an underflowed value of ar->pright - size to
  ext4_get_group_no_and_offset(), which will trigger a BUG_ON later on.
  - TYT ]
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 2479bb6cbdb4d56b807bbe5229e3e26a6f1f4530
Version c9de560ded61faa5b754137b7753da252391c55a
Status affected
Version < 390eee955d4de4662db5e3e9e9a9eae020432cb7
Version c9de560ded61faa5b754137b7753da252391c55a
Status affected
Version < cee78217a7ae72d11c2e21e1a5263b8044489823
Version c9de560ded61faa5b754137b7753da252391c55a
Status affected
Version < 3ca3005b502ca8ea87d6a344323b179b48c4e4a3
Version c9de560ded61faa5b754137b7753da252391c55a
Status affected
Version < bc4a3e1d07a86ae5845321d371190244acacb2f2
Version c9de560ded61faa5b754137b7753da252391c55a
Status affected
Version < c6bee8970075b256fc1b07bf4873049219380818
Version c9de560ded61faa5b754137b7753da252391c55a
Status affected
Version < abb330ffaa3a0ae7ce632e28c9260b461c01f19f
Version c9de560ded61faa5b754137b7753da252391c55a
Status affected
Version < b07ffe6927c75d99af534d685282ea188d9f71a6
Version c9de560ded61faa5b754137b7753da252391c55a
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 2.6.25
Status affected
Version < 2.6.25
Version 0
Status unaffected
Version <= 4.14.*
Version 4.14.316
Status unaffected
Version <= 4.19.*
Version 4.19.284
Status unaffected
Version <= 5.4.*
Version 5.4.244
Status unaffected
Version <= 5.10.*
Version 5.10.181
Status unaffected
Version <= 5.15.*
Version 5.15.113
Status unaffected
Version <= 6.1.*
Version 6.1.30
Status unaffected
Version <= 6.3.*
Version 6.3.4
Status unaffected
Version <= *
Version 6.4
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.04% 0.1
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.