目標達成 すべての支援者に感謝 — 100%達成しました!

目標: 1000 CNY · 調達済み: 1000 CNY

100.0%

CVE-2023-52897— Linux kernel 安全漏洞

EPSS 0.02% · P5
新しい脆弱性情報の通知を購読するログインして購読

I. CVE-2023-52897の基本情報

脆弱性情報

脆弱性についてご質問がありますか?Shenlongの分析が参考になるかご確認ください!
Shenlongの10の質問を表示 ↗

高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。

脆弱性タイトル
btrfs: qgroup: do not warn on record without old_roots populated
ソース: NVD (National Vulnerability Database)
脆弱性説明
In the Linux kernel, the following vulnerability has been resolved: btrfs: qgroup: do not warn on record without old_roots populated [BUG] There are some reports from the mailing list that since v6.1 kernel, the WARN_ON() inside btrfs_qgroup_account_extent() gets triggered during rescan: WARNING: CPU: 3 PID: 6424 at fs/btrfs/qgroup.c:2756 btrfs_qgroup_account_extents+0x1ae/0x260 [btrfs] CPU: 3 PID: 6424 Comm: snapperd Tainted: P OE 6.1.2-1-default #1 openSUSE Tumbleweed 05c7a1b1b61d5627475528f71f50444637b5aad7 RIP: 0010:btrfs_qgroup_account_extents+0x1ae/0x260 [btrfs] Call Trace: <TASK> btrfs_commit_transaction+0x30c/0xb40 [btrfs c39c9c546c241c593f03bd6d5f39ea1b676250f6] ? start_transaction+0xc3/0x5b0 [btrfs c39c9c546c241c593f03bd6d5f39ea1b676250f6] btrfs_qgroup_rescan+0x42/0xc0 [btrfs c39c9c546c241c593f03bd6d5f39ea1b676250f6] btrfs_ioctl+0x1ab9/0x25c0 [btrfs c39c9c546c241c593f03bd6d5f39ea1b676250f6] ? __rseq_handle_notify_resume+0xa9/0x4a0 ? mntput_no_expire+0x4a/0x240 ? __seccomp_filter+0x319/0x4d0 __x64_sys_ioctl+0x90/0xd0 do_syscall_64+0x5b/0x80 ? syscall_exit_to_user_mode+0x17/0x40 ? do_syscall_64+0x67/0x80 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7fd9b790d9bf </TASK> [CAUSE] Since commit e15e9f43c7ca ("btrfs: introduce BTRFS_QGROUP_RUNTIME_FLAG_NO_ACCOUNTING to skip qgroup accounting"), if our qgroup is already in inconsistent state, we will no longer do the time-consuming backref walk. This can leave some qgroup records without a valid old_roots ulist. Normally this is fine, as btrfs_qgroup_account_extents() would also skip those records if we have NO_ACCOUNTING flag set. But there is a small window, if we have NO_ACCOUNTING flag set, and inserted some qgroup_record without a old_roots ulist, but then the user triggered a qgroup rescan. During btrfs_qgroup_rescan(), we firstly clear NO_ACCOUNTING flag, then commit current transaction. And since we have a qgroup_record with old_roots = NULL, we trigger the WARN_ON() during btrfs_qgroup_account_extents(). [FIX] Unfortunately due to the introduction of NO_ACCOUNTING flag, the assumption that every qgroup_record would have its old_roots populated is no longer correct. Fix the false alerts and drop the WARN_ON().
ソース: NVD (National Vulnerability Database)
CVSS情報
N/A
ソース: NVD (National Vulnerability Database)
脆弱性タイプ
N/A
ソース: NVD (National Vulnerability Database)
脆弱性タイトル
Linux kernel 安全漏洞
ソース: CNNVD (China National Vulnerability Database)
脆弱性説明
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于 btrfs 文件系统在qgroup重扫时不应该警告记录没有old_roots。
ソース: CNNVD (China National Vulnerability Database)
CVSS情報
N/A
ソース: CNNVD (China National Vulnerability Database)
脆弱性タイプ
N/A
ソース: CNNVD (China National Vulnerability Database)

影響を受ける製品

ベンダープロダクト影響を受けるバージョンCPE購読
LinuxLinux e15e9f43c7ca25603fcf4c20d44ec777726f1034 ~ bb2c2e62539f2b63c5e0beb51501d328260c7595 -
LinuxLinux 6.1 -

II. CVE-2023-52897の公開POC

#POC説明ソースリンクShenlongリンク
AI生成POCプレミアム

公開POCは見つかりませんでした。

ログインしてAI POCを生成

III. CVE-2023-52897のインテリジェンス情報

登录查看更多情报信息。

Same Patch Batch · Linux · 2024-08-21 · 69 CVEs total

CVE-2022-48876wifi: mac80211: fix initialization of rx->link and rx->link_sta
CVE-2024-43874crypto: ccp - Fix null pointer dereference in __sev_snp_shutdown_locked
CVE-2024-43873vhost/vsock: always initialize seqpacket_allow
CVE-2024-43875PCI: endpoint: Clean up error handling in vpci_scan_bus()
CVE-2022-48870tty: fix possible null-ptr-defer in spk_ttyio_release
CVE-2022-48871tty: serial: qcom-geni-serial: fix slab-out-of-bounds on RX FIFO buffer
CVE-2022-48872misc: fastrpc: Fix use-after-free race condition for maps
CVE-2022-48873misc: fastrpc: Don't remove map on creater_process and device_release
CVE-2022-48874misc: fastrpc: Fix use-after-free and race in fastrpc_map_find
CVE-2022-48875wifi: mac80211: sdata can be NULL during AMPDU start
CVE-2022-48869USB: gadgetfs: Fix race between mounting and unmounting
CVE-2022-48877f2fs: let's avoid panic if extent_tree is not created
CVE-2022-48878Bluetooth: hci_qca: Fix driver shutdown on closed serdev
CVE-2022-48879efi: fix NULL-deref in init error path
CVE-2022-48880platform/surface: aggregator: Add missing call to ssam_request_sync_free()
CVE-2022-48881platform/x86/amd: Fix refcount leak in amd_pmc_probe
CVE-2022-48882net/mlx5e: Fix macsec possible null dereference when updating MAC security entity (SecY)
CVE-2022-48883net/mlx5e: IPoIB, Block PKEY interfaces with less rx queues than parent
CVE-2022-48884net/mlx5: Fix command stats access after free
CVE-2022-48885ice: Fix potential memory leak in ice_gnss_tty_write()

Showing 20 of 69 CVEs. View all on vendor page →

IV. 関連脆弱性

V. CVE-2023-52897へのコメント

まだコメントはありません


コメントを残す