{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T21:24:56.188","vulnerabilities":[{"cve":{"id":"CVE-2023-54317","sourceIdentifier":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","published":"2025-12-30T13:16:20.973","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\ndm flakey: don't corrupt the zero page\n\nWhen we need to zero some range on a block device, the function\n__blkdev_issue_zero_pages submits a write bio with the bio vector pointing\nto the zero page. If we use dm-flakey with corrupt bio writes option, it\nwill corrupt the content of the zero page which results in crashes of\nvarious userspace programs. Glibc assumes that memory returned by mmap is\nzeroed and it uses it for calloc implementation; if the newly mapped\nmemory is not zeroed, calloc will return non-zeroed memory.\n\nFix this bug by testing if the page is equal to ZERO_PAGE(0) and\navoiding the corruption in this case."},{"lang":"es","value":"En el kernel de Linux, la siguiente vulnerabilidad ha sido resuelta:\n\ndm flakey: no corromper la página cero\n\nCuando necesitamos poner a cero un rango en un dispositivo de bloques, la función __blkdev_issue_zero_pages envía un bio de escritura con el vector bio apuntando a la página cero. Si usamos dm-flakey con la opción de escrituras bio corruptas, corromperá el contenido de la página cero, lo que resulta en fallos de varios programas de espacio de usuario. Glibc asume que la memoria devuelta por mmap está puesta a cero y la usa para la implementación de calloc; si la memoria recién mapeada no está puesta a cero, calloc devolverá memoria no puesta a cero.\n\nSoluciona este error probando si la página es igual a ZERO_PAGE(0) y evitando la corrupción en este caso."}],"metrics":{},"references":[{"url":"https://git.kernel.org/stable/c/3c4a56ef7c538d16c1738ba0ccea9e7146105b5a","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/63d31617883d64b43b0e2d529f0751f40713ecae","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/98e311be44dbe31ad9c42aa067b2359bac451fda","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/b7f8892f672222dbfcc721f51edc03963212b249","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/be360c83f2d810493c04f999d69ec9152981e0c0","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/f2b478228bfdd11e358c5bc197561331f5d5c394","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/f50714b57aecb6b3dc81d578e295f86d9c73f078","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/ff60b2bb680ebcaf8890814dd51084a022891469","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"}]}}]}