CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
5.1%
In the Linux kernel, the following vulnerability has been resolved: block:
add check that partition length needs to be aligned with block size Before
calling add partition or resize partition, there is no check on whether the
length is aligned with the logical block size. If the logical block size of
the disk is larger than 512 bytes, then the partition size maybe not the
multiple of the logical block size, and when the last sector is read,
bio_truncate() will adjust the bio size, resulting in an IO error if the
size of the read command is smaller than the logical block size.If
integrity data is supported, this will also result in a null pointer
dereference when calling bio_integrity_free.
Author | Note |
---|---|
rodrigo-zaiden | USN-6765-1 for linux-oem-6.5 wrongly stated that this CVE was fixed in version 6.5.0-1022.23. The mentioned notice was revoked and the state of the fix for linux-oem-6.5 was recovered to the previous state. |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < 5.15.0-102.112 | UNKNOWN |
ubuntu | 23.10 | noarch | linux | < 6.5.0-41.41 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < 5.15.0-1057.63 | UNKNOWN |
ubuntu | 23.10 | noarch | linux-aws | < 6.5.0-1021.21 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws-5.15 | < 5.15.0-1057.63~20.04.1 | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws-6.5 | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-azure | < 5.15.0-1060.69 | UNKNOWN |
git.kernel.org/stable/c/5010c27120962c85d2f421d2cf211791c9603503
git.kernel.org/stable/c/6f64f866aa1ae6975c95d805ed51d7e9433a0016
git.kernel.org/stable/c/bcdc288e7bc008daf38ef0401b53e4a8bb61bbe5
git.kernel.org/stable/c/cb16cc1abda18a9514106d2ac8c8d7abc0be5ed8
git.kernel.org/stable/c/ef31cc87794731ffcb578a195a2c47d744e25fb8
launchpad.net/bugs/cve/CVE-2023-52458
nvd.nist.gov/vuln/detail/CVE-2023-52458
security-tracker.debian.org/tracker/CVE-2023-52458
ubuntu.com/security/notices/USN-6688-1
ubuntu.com/security/notices/USN-6725-1
ubuntu.com/security/notices/USN-6725-2
ubuntu.com/security/notices/USN-6818-1
ubuntu.com/security/notices/USN-6818-2
ubuntu.com/security/notices/USN-6818-3
ubuntu.com/security/notices/USN-6818-4
ubuntu.com/security/notices/USN-6819-1
ubuntu.com/security/notices/USN-6819-2
ubuntu.com/security/notices/USN-6819-3
ubuntu.com/security/notices/USN-6819-4
www.cve.org/CVERecord?id=CVE-2023-52458