CVE-2023-54182
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
30/12/2025
Última modificación:
30/12/2025
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
f2fs: fix to check readonly condition correctly<br />
<br />
With below case, it can mount multi-device image w/ rw option, however<br />
one of secondary device is set as ro, later update will cause panic, so<br />
let&#39;s introduce f2fs_dev_is_readonly(), and check multi-devices rw status<br />
in f2fs_remount() w/ it in order to avoid such inconsistent mount status.<br />
<br />
mkfs.f2fs -c /dev/zram1 /dev/zram0 -f<br />
blockdev --setro /dev/zram1<br />
mount -t f2fs dev/zram0 /mnt/f2fs<br />
mount: /mnt/f2fs: WARNING: source write-protected, mounted read-only.<br />
mount -t f2fs -o remount,rw mnt/f2fs<br />
dd if=/dev/zero of=/mnt/f2fs/file bs=1M count=8192<br />
<br />
kernel BUG at fs/f2fs/inline.c:258!<br />
RIP: 0010:f2fs_write_inline_data+0x23e/0x2d0 [f2fs]<br />
Call Trace:<br />
f2fs_write_single_data_page+0x26b/0x9f0 [f2fs]<br />
f2fs_write_cache_pages+0x389/0xa60 [f2fs]<br />
__f2fs_write_data_pages+0x26b/0x2d0 [f2fs]<br />
f2fs_write_data_pages+0x2e/0x40 [f2fs]<br />
do_writepages+0xd3/0x1b0<br />
__writeback_single_inode+0x5b/0x420<br />
writeback_sb_inodes+0x236/0x5a0<br />
__writeback_inodes_wb+0x56/0xf0<br />
wb_writeback+0x2a3/0x490<br />
wb_do_writeback+0x2b2/0x330<br />
wb_workfn+0x6a/0x260<br />
process_one_work+0x270/0x5e0<br />
worker_thread+0x52/0x3e0<br />
kthread+0xf4/0x120<br />
ret_from_fork+0x29/0x50



