{"id":"CVE-2023-52444","summary":"f2fs: fix to avoid dirent corruption","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix to avoid dirent corruption\n\nAs Al reported in link[1]:\n\nf2fs_rename()\n...\n\tif (old_dir != new_dir && !whiteout)\n\t\tf2fs_set_link(old_inode, old_dir_entry,\n\t\t\t\t\told_dir_page, new_dir);\n\telse\n\t\tf2fs_put_page(old_dir_page, 0);\n\nYou want correct inumber in the \"..\" link.  And cross-directory\nrename does move the source to new parent, even if you'd been asked\nto leave a whiteout in the old place.\n\n[1] https://lore.kernel.org/all/20231017055040.GN800259@ZenIV/\n\nWith below testcase, it may cause dirent corruption, due to it missed\nto call f2fs_set_link() to update \"..\" link to new directory.\n- mkdir -p dir/foo\n- renameat2 -w dir/foo bar\n\n[ASSERT] (__chk_dots_dentries:1421)  --\u003e Bad inode number[0x4] for '..', parent parent ino is [0x3]\n[FSCK] other corrupted bugs                           [Fail]","modified":"2026-04-11T12:46:30.942975Z","published":"2024-02-22T16:21:37.043Z","related":["USN-6818-2","USN-6819-2"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52444.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/02160112e6d45c2610b049df6eb693d7a2e57b46"},{"type":"WEB","url":"https://git.kernel.org/stable/c/2fb4867f4405aea8c0519d7d188207f232a57862"},{"type":"WEB","url":"https://git.kernel.org/stable/c/53edb549565f55ccd0bdf43be3d66ce4c2d48b28"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5624a3c1b1ebc8991318e1cce2aa719542991024"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6f866885e147d33efc497f1095f35b2ee5ec7310"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d3c0b49aaa12a61d560528f5d605029ab57f0728"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f0145860c20be6bae6785c7a2249577674702ac7"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f100ba617d8be6c98a68f3744ef7617082975b77"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52444.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52444"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"7e01e7ad746bc8198a8b46163ddc73a1c7d22339"},{"fixed":"02160112e6d45c2610b049df6eb693d7a2e57b46"},{"fixed":"5624a3c1b1ebc8991318e1cce2aa719542991024"},{"fixed":"6f866885e147d33efc497f1095f35b2ee5ec7310"},{"fixed":"f100ba617d8be6c98a68f3744ef7617082975b77"},{"fixed":"f0145860c20be6bae6785c7a2249577674702ac7"},{"fixed":"d3c0b49aaa12a61d560528f5d605029ab57f0728"},{"fixed":"2fb4867f4405aea8c0519d7d188207f232a57862"},{"fixed":"53edb549565f55ccd0bdf43be3d66ce4c2d48b28"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52444.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"4.2.0"},{"fixed":"4.19.306"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.20.0"},{"fixed":"5.4.268"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.209"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.148"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.75"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.6.14"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.7.0"},{"fixed":"6.7.2"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52444.json"}}],"schema_version":"1.7.5"}