First published: Wed Mar 06 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to tag gcing flag on page during block migration It needs to add missing gcing flag on page during block migration, in order to garantee migrated data be persisted during checkpoint, otherwise out-of-order persistency between data and node may cause data corruption after SPOR. Similar issue was fixed by commit 2d1fe8a86bf5 ("f2fs: fix to tag gcing flag on page during file defragment").
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux | <=5.10.223-1<=5.10.226-1 | 6.1.123-1 6.1.119-1 6.12.10-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-52588 has not been explicitly categorized, but it pertains to a potentially impactful issue in the Linux kernel.
To resolve CVE-2023-52588, update your Linux kernel to the fixed version 6.1.123-1, 6.1.119-1, or 6.12.10-1.
CVE-2023-52588 affects Linux kernel versions up to and including 5.10.226-1.
CVE-2023-52588 can potentially lead to data persistence issues during block migration due to the missing gcing flag.
Yes, the Debian package 'linux' resolves CVE-2023-52588 in its versions 6.1.123-1, 6.1.119-1, and 6.12.10-1.