blob: d3f6ad72a61e4a53b064a322c7f4000839029809 [file] [log] [blame]
{
"containers": {
"cna": {
"providerMetadata": {
"orgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038"
},
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: fix data corruption after failed write\n\nWhen buffered write fails to copy data into underlying page cache page,\nocfs2_write_end_nolock() just zeroes out and dirties the page. This can\nleave dirty page beyond EOF and if page writeback tries to write this page\nbefore write succeeds and expands i_size, page gets into inconsistent\nstate where page dirty bit is clear but buffer dirty bits stay set\nresulting in page data never getting written and so data copied to the\npage is lost. Fix the problem by invalidating page beyond EOF after\nfailed write."
}
],
"affected": [
{
"product": "Linux",
"vendor": "Linux",
"defaultStatus": "unaffected",
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"programFiles": [
"fs/ocfs2/aops.c"
],
"versions": [
{
"version": "7ed80e77c908cbaa686529a49f8ae0060c5caee7",
"lessThan": "1629f6f522b2d058019710466a84b240683bbee3",
"status": "affected",
"versionType": "git"
},
{
"version": "7ce2b16bad2cbfa3fa7bbc42c4448914f639ca47",
"lessThan": "c26f3ff4c0be590c1250f945ac2e4fc5fcdc5f45",
"status": "affected",
"versionType": "git"
},
{
"version": "f8a6a2ed4b7d1c3c8631eeb6d00572bc853094a8",
"lessThan": "4c24eb49ab44351424ac8fe8567f91ea48a06089",
"status": "affected",
"versionType": "git"
},
{
"version": "6dbf7bb555981fb5faf7b691e8f6169fc2b2e63b",
"lessThan": "91d7a4bd5656552d6259e2d0f8859f9e8cc5ef68",
"status": "affected",
"versionType": "git"
},
{
"version": "6dbf7bb555981fb5faf7b691e8f6169fc2b2e63b",
"lessThan": "a9e53869cb43c96d6d851c491fd4e26430ab6ba6",
"status": "affected",
"versionType": "git"
},
{
"version": "6dbf7bb555981fb5faf7b691e8f6169fc2b2e63b",
"lessThan": "47eb055ad3588fc96d34e9e1dd87b210ce62906b",
"status": "affected",
"versionType": "git"
},
{
"version": "6dbf7bb555981fb5faf7b691e8f6169fc2b2e63b",
"lessThan": "205759c6c18f54659b0b5976b14a52d1b3eb9f57",
"status": "affected",
"versionType": "git"
},
{
"version": "6dbf7bb555981fb5faf7b691e8f6169fc2b2e63b",
"lessThan": "90410bcf873cf05f54a32183afff0161f44f9715",
"status": "affected",
"versionType": "git"
},
{
"version": "acef5107e2eacb08a16ad5db60320d65bd26a6c0",
"status": "affected",
"versionType": "git"
},
{
"version": "36ed9e604215f58cec0381ca5fcc6da05f2d87ca",
"status": "affected",
"versionType": "git"
}
]
},
{
"product": "Linux",
"vendor": "Linux",
"defaultStatus": "affected",
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"programFiles": [
"fs/ocfs2/aops.c"
],
"versions": [
{
"version": "5.10",
"status": "affected"
},
{
"version": "0",
"lessThan": "5.10",
"status": "unaffected",
"versionType": "semver"
},
{
"version": "4.14.312",
"lessThanOrEqual": "4.14.*",
"status": "unaffected",
"versionType": "semver"
},
{
"version": "4.19.280",
"lessThanOrEqual": "4.19.*",
"status": "unaffected",
"versionType": "semver"
},
{
"version": "5.4.240",
"lessThanOrEqual": "5.4.*",
"status": "unaffected",
"versionType": "semver"
},
{
"version": "5.10.177",
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"versionType": "semver"
},
{
"version": "5.15.105",
"lessThanOrEqual": "5.15.*",
"status": "unaffected",
"versionType": "semver"
},
{
"version": "6.1.21",
"lessThanOrEqual": "6.1.*",
"status": "unaffected",
"versionType": "semver"
},
{
"version": "6.2.8",
"lessThanOrEqual": "6.2.*",
"status": "unaffected",
"versionType": "semver"
},
{
"version": "6.3",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.14.204",
"versionEndExcluding": "4.14.312"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.19.155",
"versionEndExcluding": "4.19.280"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.4.75",
"versionEndExcluding": "5.4.240"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.10",
"versionEndExcluding": "5.10.177"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.10",
"versionEndExcluding": "5.15.105"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.10",
"versionEndExcluding": "6.1.21"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.10",
"versionEndExcluding": "6.2.8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.10",
"versionEndExcluding": "6.3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.9.242"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.9.5"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/1629f6f522b2d058019710466a84b240683bbee3"
},
{
"url": "https://git.kernel.org/stable/c/c26f3ff4c0be590c1250f945ac2e4fc5fcdc5f45"
},
{
"url": "https://git.kernel.org/stable/c/4c24eb49ab44351424ac8fe8567f91ea48a06089"
},
{
"url": "https://git.kernel.org/stable/c/91d7a4bd5656552d6259e2d0f8859f9e8cc5ef68"
},
{
"url": "https://git.kernel.org/stable/c/a9e53869cb43c96d6d851c491fd4e26430ab6ba6"
},
{
"url": "https://git.kernel.org/stable/c/47eb055ad3588fc96d34e9e1dd87b210ce62906b"
},
{
"url": "https://git.kernel.org/stable/c/205759c6c18f54659b0b5976b14a52d1b3eb9f57"
},
{
"url": "https://git.kernel.org/stable/c/90410bcf873cf05f54a32183afff0161f44f9715"
}
],
"title": "ocfs2: fix data corruption after failed write",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038",
"cveID": "CVE-2023-53081",
"requesterUserId": "gregkh@kernel.org",
"serial": "1",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.0"
}