-

CVE-2023-54317

In the Linux kernel, the following vulnerability has been resolved:

dm flakey: don't corrupt the zero page

When we need to zero some range on a block device, the function
__blkdev_issue_zero_pages submits a write bio with the bio vector pointing
to the zero page. If we use dm-flakey with corrupt bio writes option, it
will corrupt the content of the zero page which results in crashes of
various userspace programs. Glibc assumes that memory returned by mmap is
zeroed and it uses it for calloc implementation; if the newly mapped
memory is not zeroed, calloc will return non-zeroed memory.

Fix this bug by testing if the page is equal to ZERO_PAGE(0) and
avoiding the corruption in this case.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < b7f8892f672222dbfcc721f51edc03963212b249
Version c6cd92fcabd6cc78bb1808c6a18245c842722fc1
Status affected
Version < 98e311be44dbe31ad9c42aa067b2359bac451fda
Version d4c637af2e56ee1ec66ee34d0ac5a13c75911aec
Status affected
Version < 3c4a56ef7c538d16c1738ba0ccea9e7146105b5a
Version a00f5276e26636cbf72f24f79831026d2e2868e7
Status affected
Version < f2b478228bfdd11e358c5bc197561331f5d5c394
Version a00f5276e26636cbf72f24f79831026d2e2868e7
Status affected
Version < ff60b2bb680ebcaf8890814dd51084a022891469
Version a00f5276e26636cbf72f24f79831026d2e2868e7
Status affected
Version < be360c83f2d810493c04f999d69ec9152981e0c0
Version a00f5276e26636cbf72f24f79831026d2e2868e7
Status affected
Version < 63d31617883d64b43b0e2d529f0751f40713ecae
Version a00f5276e26636cbf72f24f79831026d2e2868e7
Status affected
Version < f50714b57aecb6b3dc81d578e295f86d9c73f078
Version a00f5276e26636cbf72f24f79831026d2e2868e7
Status affected
Version 1ed7c9f45fb893877ffa7cedd7aa61beaadbb328
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 5.0
Status affected
Version < 5.0
Version 0
Status unaffected
Version <= 4.14.*
Version 4.14.308
Status unaffected
Version <= 4.19.*
Version 4.19.276
Status unaffected
Version <= 5.4.*
Version 5.4.235
Status unaffected
Version <= 5.10.*
Version 5.10.173
Status unaffected
Version <= 5.15.*
Version 5.15.99
Status unaffected
Version <= 6.1.*
Version 6.1.16
Status unaffected
Version <= 6.2.*
Version 6.2.3
Status unaffected
Version <= *
Version 6.3
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.04% 0.099
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.