First published: Fri Feb 23 2024(Updated: )
Before calling add partition or resize partition, there is no check on whether the length is aligned with the logical block size. If the logical block size of the disk is larger than 512 bytes, then the partition size maybe not the multiple of the logical block size, and when the last sector is read, bio_truncate() will adjust the bio size, resulting in an IO error if the size of the read command is smaller than the logical block size.If integrity data is supported, this will also result in a null pointer dereference when calling bio_integrity_free.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <6.8 | 6.8 |
Linux Kernel | <5.10.215 | |
Linux Kernel | >=5.11.0<5.15.148 | |
Linux Kernel | >=5.16.0<6.1.75 | |
Linux Kernel | >=6.2.0<6.6.14 | |
Linux Kernel | >=6.7.0<6.7.2 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.119-1 6.12.10-1 6.12.11-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-52458 has been classified with a severity level that indicates a potential risk during partition resizing and adding due to alignment issues with logical block sizes.
To mitigate CVE-2023-52458, update to the remedied versions provided by your distribution, specifically Red Hat kernel 6.8 or Debian Linux versions indicated.
CVE-2023-52458 affects multiple versions of the Linux kernel, specifically those that do not enforce checks on partition size alignment.
CVE-2023-52458 does not explicitly state a denial of service vulnerability, but improper partition management may lead to unexpected behaviors.
CVE-2023-52458 does not mention remote exploitation, suggesting that exploitation would require local access to the system.