Bug 1224734 (CVE-2023-52682) - VUL-0: CVE-2023-52682: kernel: f2fs: fix to wait on block writeback for post_read case
Summary: VUL-0: CVE-2023-52682: kernel: f2fs: fix to wait on block writeback for post_...
Status: RESOLVED FIXED
Alias: CVE-2023-52682
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P5 - None : Normal
Target Milestone: ---
Assignee: Kernel Bugs
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/406466/
Whiteboard: CVSSv3.1:SUSE:CVE-2023-52682:5.5:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2024-05-20 16:23 UTC by SMASH SMASH
Modified: 2024-05-20 16:30 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description SMASH SMASH 2024-05-20 16:23:35 UTC
In the Linux kernel, the following vulnerability has been resolved:

f2fs: fix to wait on block writeback for post_read case

If inode is compressed, but not encrypted, it missed to call
f2fs_wait_on_block_writeback() to wait for GCed page writeback
in IPU write path.

Thread A				GC-Thread
					- f2fs_gc
					 - do_garbage_collect
					  - gc_data_segment
					   - move_data_block
					    - f2fs_submit_page_write
					     migrate normal cluster's block via
					     meta_inode's page cache
- f2fs_write_single_data_page
 - f2fs_do_write_data_page
  - f2fs_inplace_write_data
   - f2fs_submit_page_bio

IRQ
- f2fs_read_end_io
					IRQ
					old data overrides new data due to
					out-of-order GC and common IO.
					- f2fs_read_end_io

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-52682
https://git.kernel.org/pub/scm/linux/security/vulns.git/plain/cve/published/2023/CVE-2023-52682.mbox
https://git.kernel.org/stable/c/9bfd5ea71521d0e522ba581c6ccc5db93759c0c3
https://git.kernel.org/stable/c/4535be48780431753505e74e1b1ad4836a189bc2
https://git.kernel.org/stable/c/f904c156d8011d8291ffd5b6b398f3747e294986
https://git.kernel.org/stable/c/55fdc1c24a1d6229fe0ecf31335fb9a2eceaaa00
https://www.cve.org/CVERecord?id=CVE-2023-52682
https://bugzilla.redhat.com/show_bug.cgi?id=2281319