We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2023-53081

ocfs2: fix data corruption after failed write



Description

In the Linux kernel, the following vulnerability has been resolved: ocfs2: fix data corruption after failed write When buffered write fails to copy data into underlying page cache page, ocfs2_write_end_nolock() just zeroes out and dirties the page. This can leave dirty page beyond EOF and if page writeback tries to write this page before write succeeds and expands i_size, page gets into inconsistent state where page dirty bit is clear but buffer dirty bits stay set resulting in page data never getting written and so data copied to the page is lost. Fix the problem by invalidating page beyond EOF after failed write.

Reserved 2025-05-02 | Published 2025-05-02 | Updated 2025-05-04 | Assigner Linux

Product status

Default status
unaffected

7ed80e77c908cbaa686529a49f8ae0060c5caee7 before 1629f6f522b2d058019710466a84b240683bbee3
affected

7ce2b16bad2cbfa3fa7bbc42c4448914f639ca47 before c26f3ff4c0be590c1250f945ac2e4fc5fcdc5f45
affected

f8a6a2ed4b7d1c3c8631eeb6d00572bc853094a8 before 4c24eb49ab44351424ac8fe8567f91ea48a06089
affected

6dbf7bb555981fb5faf7b691e8f6169fc2b2e63b before 91d7a4bd5656552d6259e2d0f8859f9e8cc5ef68
affected

6dbf7bb555981fb5faf7b691e8f6169fc2b2e63b before a9e53869cb43c96d6d851c491fd4e26430ab6ba6
affected

6dbf7bb555981fb5faf7b691e8f6169fc2b2e63b before 47eb055ad3588fc96d34e9e1dd87b210ce62906b
affected

6dbf7bb555981fb5faf7b691e8f6169fc2b2e63b before 205759c6c18f54659b0b5976b14a52d1b3eb9f57
affected

6dbf7bb555981fb5faf7b691e8f6169fc2b2e63b before 90410bcf873cf05f54a32183afff0161f44f9715
affected

acef5107e2eacb08a16ad5db60320d65bd26a6c0
affected

36ed9e604215f58cec0381ca5fcc6da05f2d87ca
affected

Default status
affected

5.10
affected

Any version before 5.10
unaffected

4.14.312
unaffected

4.19.280
unaffected

5.4.240
unaffected

5.10.177
unaffected

5.15.105
unaffected

6.1.21
unaffected

6.2.8
unaffected

6.3
unaffected

References

git.kernel.org/...c/1629f6f522b2d058019710466a84b240683bbee3

git.kernel.org/...c/c26f3ff4c0be590c1250f945ac2e4fc5fcdc5f45

git.kernel.org/...c/4c24eb49ab44351424ac8fe8567f91ea48a06089

git.kernel.org/...c/91d7a4bd5656552d6259e2d0f8859f9e8cc5ef68

git.kernel.org/...c/a9e53869cb43c96d6d851c491fd4e26430ab6ba6

git.kernel.org/...c/47eb055ad3588fc96d34e9e1dd87b210ce62906b

git.kernel.org/...c/205759c6c18f54659b0b5976b14a52d1b3eb9f57

git.kernel.org/...c/90410bcf873cf05f54a32183afff0161f44f9715

cve.org (CVE-2023-53081)

nvd.nist.gov (CVE-2023-53081)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2023-53081

Support options

Helpdesk Chat, Email, Knowledgebase