CVE-2023-53829
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
09/12/2025
Última modificación:
09/12/2025
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
f2fs: flush inode if atomic file is aborted<br />
<br />
Let&#39;s flush the inode being aborted atomic operation to avoid stale dirty<br />
inode during eviction in this call stack:<br />
<br />
f2fs_mark_inode_dirty_sync+0x22/0x40 [f2fs]<br />
f2fs_abort_atomic_write+0xc4/0xf0 [f2fs]<br />
f2fs_evict_inode+0x3f/0x690 [f2fs]<br />
? sugov_start+0x140/0x140<br />
evict+0xc3/0x1c0<br />
evict_inodes+0x17b/0x210<br />
generic_shutdown_super+0x32/0x120<br />
kill_block_super+0x21/0x50<br />
deactivate_locked_super+0x31/0x90<br />
cleanup_mnt+0x100/0x160<br />
task_work_run+0x59/0x90<br />
do_exit+0x33b/0xa50<br />
do_group_exit+0x2d/0x80<br />
__x64_sys_exit_group+0x14/0x20<br />
do_syscall_64+0x3b/0x90<br />
entry_SYSCALL_64_after_hwframe+0x63/0xcd<br />
<br />
This triggers f2fs_bug_on() in f2fs_evict_inode:<br />
f2fs_bug_on(sbi, is_inode_flag_set(inode, FI_DIRTY_INODE));<br />
<br />
This fixes the syzbot report:<br />
<br />
loop0: detected capacity change from 0 to 131072<br />
F2FS-fs (loop0): invalid crc value<br />
F2FS-fs (loop0): Found nat_bits in checkpoint<br />
F2FS-fs (loop0): Mounted with checkpoint version = 48b305e4<br />
------------[ cut here ]------------<br />
kernel BUG at fs/f2fs/inode.c:869!<br />
invalid opcode: 0000 [#1] PREEMPT SMP KASAN<br />
CPU: 0 PID: 5014 Comm: syz-executor220 Not tainted 6.4.0-syzkaller-11479-g6cd06ab12d1a #0<br />
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023<br />
RIP: 0010:f2fs_evict_inode+0x172d/0x1e00 fs/f2fs/inode.c:869<br />
Code: ff df 48 c1 ea 03 80 3c 02 00 0f 85 6a 06 00 00 8b 75 40 ba 01 00 00 00 4c 89 e7 e8 6d ce 06 00 e9 aa fc ff ff e8 63 22 e2 fd 0b e8 5c 22 e2 fd 48 c7 c0 a8 3a 18 8d 48 ba 00 00 00 00 00 fc<br />
RSP: 0018:ffffc90003a6fa00 EFLAGS: 00010293<br />
RAX: 0000000000000000 RBX: 0000000000000001 RCX: 0000000000000000<br />
RDX: ffff8880273b8000 RSI: ffffffff83a2bd0d RDI: 0000000000000007<br />
RBP: ffff888077db91b0 R08: 0000000000000007 R09: 0000000000000000<br />
R10: 0000000000000001 R11: 0000000000000001 R12: ffff888029a3c000<br />
R13: ffff888077db9660 R14: ffff888029a3c0b8 R15: ffff888077db9c50<br />
FS: 0000000000000000(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000<br />
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br />
CR2: 00007f1909bb9000 CR3: 00000000276a9000 CR4: 0000000000350ef0<br />
Call Trace:<br />
<br />
evict+0x2ed/0x6b0 fs/inode.c:665<br />
dispose_list+0x117/0x1e0 fs/inode.c:698<br />
evict_inodes+0x345/0x440 fs/inode.c:748<br />
generic_shutdown_super+0xaf/0x480 fs/super.c:478<br />
kill_block_super+0x64/0xb0 fs/super.c:1417<br />
kill_f2fs_super+0x2af/0x3c0 fs/f2fs/super.c:4704<br />
deactivate_locked_super+0x98/0x160 fs/super.c:330<br />
deactivate_super+0xb1/0xd0 fs/super.c:361<br />
cleanup_mnt+0x2ae/0x3d0 fs/namespace.c:1254<br />
task_work_run+0x16f/0x270 kernel/task_work.c:179<br />
exit_task_work include/linux/task_work.h:38 [inline]<br />
do_exit+0xa9a/0x29a0 kernel/exit.c:874<br />
do_group_exit+0xd4/0x2a0 kernel/exit.c:1024<br />
__do_sys_exit_group kernel/exit.c:1035 [inline]<br />
__se_sys_exit_group kernel/exit.c:1033 [inline]<br />
__x64_sys_exit_group+0x3e/0x50 kernel/exit.c:1033<br />
do_syscall_x64 arch/x86/entry/common.c:50 [inline]<br />
do_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80<br />
entry_SYSCALL_64_after_hwframe+0x63/0xcd<br />
RIP: 0033:0x7f309be71a09<br />
Code: Unable to access opcode bytes at 0x7f309be719df.<br />
RSP: 002b:00007fff171df518 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7<br />
RAX: ffffffffffffffda RBX: 00007f309bef7330 RCX: 00007f309be71a09<br />
RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000001<br />
RBP: 0000000000000001 R08: ffffffffffffffc0 R09: 00007f309bef1e40<br />
R10: 0000000000010600 R11: 0000000000000246 R12: 00007f309bef7330<br />
R13: 0000000000000001 R14: 0000000000000000 R15: 0000000000000001<br />
<br />
Modules linked in:<br />
---[ end trace 0000000000000000 ]---<br />
RIP: 0010:f2fs_evict_inode+0x172d/0x1e00 fs/f2fs/inode.c:869<br />
Code: ff df 48 c1 ea 03 80 3c 02 00 0f 85 6a 06 00 00 8b 75 40 ba 01 00 00 00 4c 89 e7 e8 6d ce 06 00 e9 aa fc ff ff e8 63 22 e2 fd 0b e8 5c 22 e2 fd 48 c7 c0 a8 3a 18 8d 48 ba 00 00 00 00 00 fc<br />
RSP: 0018:ffffc90003a6fa00 EFLAGS: 00010293<br />
RAX: 0000000000000000 RBX: 0000000000<br />
---truncated---



