DEBIAN-CVE-2023-52582

Source
https://security-tracker.debian.org/tracker/CVE-2023-52582
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2023-52582.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2023-52582
Upstream
Published
2024-03-02T22:15:49Z
Modified
2025-09-25T23:28:57.662714Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved: netfs: Only call foliostartfscache() one time for each folio If a network filesystem using netfs implements a clamplength() function, it can set subrequest lengths smaller than a page size. When we loop through the folios in netfsrrequnlockfolios() to set any folios to be written back, we need to make sure we only call foliostartfscache() once for each folio. Otherwise, this simple testcase: mount -o fsc,rsize=1024,wsize=1024 127.0.0.1:/export /mnt/nfs dd if=/dev/zero of=/mnt/nfs/file.bin bs=4096 count=1 1+0 records in 1+0 records out 4096 bytes (4.1 kB, 4.0 KiB) copied, 0.0126359 s, 324 kB/s echo 3 > /proc/sys/vm/dropcaches cat /mnt/nfs/file.bin > /dev/null will trigger an oops similar to the following: page dumped because: VMBUGONFOLIO(foliotestprivate2(folio)) ------------[ cut here ]------------ kernel BUG at include/linux/netfs.h:44! ... CPU: 5 PID: 134 Comm: kworker/u16:5 Kdump: loaded Not tainted 6.4.0-rc5 ... RIP: 0010:netfsrrequnlockfolios+0x68e/0x730 [netfs] ... Call Trace: netfsrreqassess+0x497/0x660 [netfs] netfssubreqterminated+0x32b/0x610 [netfs] nfsnetfsreadcompletion+0x14e/0x1a0 [nfs] nfsreadcompletion+0x2f9/0x330 [nfs] rpcfreetask+0x72/0xa0 [sunrpc] rpcasyncrelease+0x46/0x70 [sunrpc] processonework+0x3bd/0x710 workerthread+0x89/0x610 kthread+0x181/0x1c0 retfromfork+0x29/0x50

References

Affected packages

Debian:12 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.1.64-1

Affected versions

6.*

6.1.27-1
6.1.37-1
6.1.38-1
6.1.38-2~bpo11+1
6.1.38-2
6.1.38-3
6.1.38-4~bpo11+1
6.1.38-4
6.1.52-1
6.1.55-1~bpo11+1
6.1.55-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.5.6-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.5.6-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}