An issue was discovered in the Linux kernel before 6.3.3. There is an out-of-bounds read in crc16 in lib/crc16.c when called from fs/ext4/super.c because ext4_group_desc_csum does not properly check an offset. NOTE: this is disputed by third parties because the kernel is not intended to defend against attackers with the stated "When modifying the block device while it is mounted by the filesystem" access.
References
| Link | Resource |
|---|---|
| https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4f04351888a83e595571de672e0a4a8b74f4fb31 | Mailing List Patch |
| https://syzkaller.appspot.com/bug?extid=8785e41224a3afd04321 | Mailing List Patch |
| https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.3 | Mailing List Patch |
| https://bugzilla.suse.com/show_bug.cgi?id=1211895 | Issue Tracking Patch Third Party Advisory |
| https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html | Mailing List Third Party Advisory |
| https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html | Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2023-05-31 20:15
Updated : 2023-11-15 02:51
NVD link : CVE-2023-34256
Mitre link : CVE-2023-34256
JSON object : View
Products Affected
linux
- linux_kernel
debian
- debian_linux
suse
- linux_enterprise
CWE
CWE-125
Out-of-bounds Read
