CVE-2023-53214
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
15/09/2025
Última modificación:
15/09/2025
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
f2fs: fix to avoid potential memory corruption in __update_iostat_latency()<br />
<br />
Add iotype sanity check to avoid potential memory corruption.<br />
This is to fix the compile error below:<br />
<br />
fs/f2fs/iostat.c:231 __update_iostat_latency() error: buffer overflow<br />
&#39;io_lat->peak_lat[type]&#39; 3 type;<br />
216 struct f2fs_sb_info *sbi = iostat_ctx->sbi;<br />
217 struct iostat_lat_info *io_lat = sbi->iostat_io_lat;<br />
218 unsigned long flags;<br />
219<br />
220 if (!sbi->iostat_enable)<br />
221 return;<br />
222<br />
223 ts_diff = jiffies - iostat_ctx->submit_ts;<br />
224 if (page_type >= META_FLUSH)<br />
^^^^^^^^^^<br />
<br />
225 page_type = META;<br />
226<br />
227 spin_lock_irqsave(&sbi->iostat_lat_lock, flags);<br />
@228 io_lat->sum_lat[type][page_type] += ts_diff;<br />
^^^^^^^^^<br />
Mixup between META_FLUSH and NR_PAGE_TYPE leads to memory corruption.



