An issue was discovered in the Linux kernel before 6.3.3. There is an out-of-bounds read in crc16 in lib/crc16.c when called from fs/ext4/super.c because ext4_group_desc_csum does not properly check an offset. NOTE: this is disputed by third parties because the kernel is not intended to defend against attackers with the stated "When modifying the block device while it is mounted by the filesystem" access.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 08:06
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugzilla.suse.com/show_bug.cgi?id=1211895 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.3 - Mailing List, Patch | |
References | () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4f04351888a83e595571de672e0a4a8b74f4fb31 - Mailing List, Patch | |
References | () https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html - Mailing List, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html - Mailing List, Third Party Advisory | |
References | () https://syzkaller.appspot.com/bug?extid=8785e41224a3afd04321 - Mailing List, Patch |
15 Nov 2023, 02:51
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* | |
First Time |
Debian
Debian debian Linux |
|
References | (MLIST) https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html - Mailing List, Third Party Advisory | |
References | (MLIST) https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html - Mailing List, Third Party Advisory |
07 Nov 2023, 04:15
Type | Values Removed | Values Added |
---|---|---|
Summary | An issue was discovered in the Linux kernel before 6.3.3. There is an out-of-bounds read in crc16 in lib/crc16.c when called from fs/ext4/super.c because ext4_group_desc_csum does not properly check an offset. NOTE: this is disputed by third parties because the kernel is not intended to defend against attackers with the stated "When modifying the block device while it is mounted by the filesystem" access. |
20 Oct 2023, 00:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
27 Jul 2023, 21:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
07 Jun 2023, 16:11
Type | Values Removed | Values Added |
---|---|---|
First Time |
Suse
Linux Linux linux Kernel Suse linux Enterprise |
|
CPE | cpe:2.3:o:suse:linux_enterprise:12.0:sp5:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise:15.0:sp5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise:15.0:sp4:*:*:*:*:*:* |
|
References | (MISC) https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.3 - Mailing List, Patch | |
References | (MISC) https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4f04351888a83e595571de672e0a4a8b74f4fb31 - Mailing List, Patch | |
References | (MISC) https://bugzilla.suse.com/show_bug.cgi?id=1211895 - Issue Tracking, Patch, Third Party Advisory | |
References | (MISC) https://syzkaller.appspot.com/bug?extid=8785e41224a3afd04321 - Mailing List, Patch | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
CWE | CWE-125 |
05 Jun 2023, 14:15
Type | Values Removed | Values Added |
---|---|---|
Summary | ** DISPUTED ** An issue was discovered in the Linux kernel before 6.3.3. There is an out-of-bounds read in crc16 in lib/crc16.c when called from fs/ext4/super.c because ext4_group_desc_csum does not properly check an offset. NOTE: this is disputed by third parties because the kernel is not intended to defend against attackers with the stated "When modifying the block device while it is mounted by the filesystem" access. | |
References |
|
31 May 2023, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-05-31 20:15
Updated : 2025-03-11 16:15
NVD link : CVE-2023-34256
Mitre link : CVE-2023-34256
CVE.ORG link : CVE-2023-34256
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
suse
- linux_enterprise
CWE
CWE-125
Out-of-bounds Read