CVE-2023-54089
Missing REQ_OP_WRITE Flush Bio Causes Data Integrity Issue in Linux virtio_pmem
Publication date: 2025-12-24
Last updated on: 2025-12-24
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.4.0-rc7 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's virtio_pmem driver is due to a missing REQ_OP_WRITE flag when allocating a flush bio during asynchronous persistent memory flush operations. Specifically, the function async_pmem_flush() does not assign the required REQ_OP_WRITE operation code for flush bio, causing submit_bio_noacct() to fail the flush bio. This leads to warnings and potential issues with flush order and optimization when performing operations like mkfs.xfs on a pmem device. The fix involves adding the missing REQ_OP_WRITE flag to ensure proper flush bio handling.
How can this vulnerability impact me? :
This vulnerability can cause flush bio operations to fail, which may lead to improper flushing of persistent memory devices. This can result in data integrity issues, such as data not being properly written or ordered on pmem devices, potentially causing data loss or corruption during filesystem operations like mkfs.xfs.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is fixed by adding the missing REQ_OP_WRITE flag for flush bio in the Linux kernel's virtio_pmem driver. To mitigate this vulnerability, you should update your Linux kernel to a version that includes this fix (post 6.4.0-rc7+).