CVE-2023-52682

In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to wait on block writeback for post_read case If inode is compressed, but not encrypted, it missed to call f2fs_wait_on_block_writeback() to wait for GCed page writeback in IPU write path. Thread A GC-Thread - f2fs_gc - do_garbage_collect - gc_data_segment - move_data_block - f2fs_submit_page_write migrate normal cluster's block via meta_inode's page cache - f2fs_write_single_data_page - f2fs_do_write_data_page - f2fs_inplace_write_data - f2fs_submit_page_bio IRQ - f2fs_read_end_io IRQ old data overrides new data due to out-of-order GC and common IO. - f2fs_read_end_io
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

19 Sep 2025, 18:45

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/4535be48780431753505e74e1b1ad4836a189bc2 - () https://git.kernel.org/stable/c/4535be48780431753505e74e1b1ad4836a189bc2 - Patch
References () https://git.kernel.org/stable/c/55fdc1c24a1d6229fe0ecf31335fb9a2eceaaa00 - () https://git.kernel.org/stable/c/55fdc1c24a1d6229fe0ecf31335fb9a2eceaaa00 - Patch
References () https://git.kernel.org/stable/c/9bfd5ea71521d0e522ba581c6ccc5db93759c0c3 - () https://git.kernel.org/stable/c/9bfd5ea71521d0e522ba581c6ccc5db93759c0c3 - Patch
References () https://git.kernel.org/stable/c/f904c156d8011d8291ffd5b6b398f3747e294986 - () https://git.kernel.org/stable/c/f904c156d8011d8291ffd5b6b398f3747e294986 - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.1
First Time Linux
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-125

Information

Published : 2024-05-17 15:15

Updated : 2025-09-19 18:45


NVD link : CVE-2023-52682

Mitre link : CVE-2023-52682

CVE.ORG link : CVE-2023-52682


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-125

Out-of-bounds Read