Description
An issue was discovered in the Linux kernel before 6.3.3. There is an out-of-bounds read in crc16 in lib/crc16.c when called from fs/ext4/super.c because ext4_group_desc_csum does not properly check an offset. NOTE: this is disputed by third parties because the kernel is not intended to defend against attackers with the stated "When modifying the block device while it is mounted by the filesystem" access.
References (6)
Core 6
Core References
Issue Tracking, Patch, Third Party Advisory
https://bugzilla.suse.com/show_bug.cgi?id=1211895
Mailing List, Patch
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.3
Mailing List, Patch
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4f04351888a83e595571de672e0a4a8b74f4fb31
Mailing List, Patch
https://syzkaller.appspot.com/bug?extid=8785e41224a3afd04321
Mailing List, Third Party Advisory mailing-list
https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html
Mailing List, Third Party Advisory mailing-list
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
Scores
CVSS v3
5.5
EPSS
0.0002
EPSS Percentile
3.6%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-125
Status
published
Products (4)
debian/debian_linux
10.0
linux/linux_kernel
< 6.3.3
suse/linux_enterprise
12.0 sp5
suse/linux_enterprise
15.0 sp4 (2 CPE variants)
Published
May 31, 2023
Tracked Since
Feb 18, 2026