Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1020 CNY

100%

CVE-2023-53035— nilfs2: fix kernel-infoleak in nilfs_ioctl_wrap_copy()

EPSS 0.06% · P17

Affected Version Matrix 18

VendorProductVersion RangeStatus
LinuxLinux003ff182fddde09ddfb8d079bbdb02f9d2122082< a94932381e8dae4117e9129b3c1282e18aa97b05affected
003ff182fddde09ddfb8d079bbdb02f9d2122082< 9c5034e9a0e03db8d5e9eabb176340259b5b97e4affected
003ff182fddde09ddfb8d079bbdb02f9d2122082< 8f5cbf6a8c0e19b062b829c5b7aca01468bb57f6affected
003ff182fddde09ddfb8d079bbdb02f9d2122082< d18db946cc6a394291539e030df32324285648f7affected
003ff182fddde09ddfb8d079bbdb02f9d2122082< 5bb105cc72beb9d51bf12f5c657336d2d35bdc5daffected
003ff182fddde09ddfb8d079bbdb02f9d2122082< 5f33b042f74fc9662eba17f4cd19b07d84bbc6c5affected
003ff182fddde09ddfb8d079bbdb02f9d2122082< 8a6550b365c0ce2e65905de57dcbfe1f7d629726affected
003ff182fddde09ddfb8d079bbdb02f9d2122082< 003587000276f81d0114b5ce773d80c119d8cb30affected
… +10 more rows
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2023-53035

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
nilfs2: fix kernel-infoleak in nilfs_ioctl_wrap_copy()
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix kernel-infoleak in nilfs_ioctl_wrap_copy() The ioctl helper function nilfs_ioctl_wrap_copy(), which exchanges a metadata array to/from user space, may copy uninitialized buffer regions to user space memory for read-only ioctl commands NILFS_IOCTL_GET_SUINFO and NILFS_IOCTL_GET_CPINFO. This can occur when the element size of the user space metadata given by the v_size member of the argument nilfs_argv structure is larger than the size of the metadata element (nilfs_suinfo structure or nilfs_cpinfo structure) on the file system side. KMSAN-enabled kernels detect this issue as follows: BUG: KMSAN: kernel-infoleak in instrument_copy_to_user include/linux/instrumented.h:121 [inline] BUG: KMSAN: kernel-infoleak in _copy_to_user+0xc0/0x100 lib/usercopy.c:33 instrument_copy_to_user include/linux/instrumented.h:121 [inline] _copy_to_user+0xc0/0x100 lib/usercopy.c:33 copy_to_user include/linux/uaccess.h:169 [inline] nilfs_ioctl_wrap_copy+0x6fa/0xc10 fs/nilfs2/ioctl.c:99 nilfs_ioctl_get_info fs/nilfs2/ioctl.c:1173 [inline] nilfs_ioctl+0x2402/0x4450 fs/nilfs2/ioctl.c:1290 nilfs_compat_ioctl+0x1b8/0x200 fs/nilfs2/ioctl.c:1343 __do_compat_sys_ioctl fs/ioctl.c:968 [inline] __se_compat_sys_ioctl+0x7dd/0x1000 fs/ioctl.c:910 __ia32_compat_sys_ioctl+0x93/0xd0 fs/ioctl.c:910 do_syscall_32_irqs_on arch/x86/entry/common.c:112 [inline] __do_fast_syscall_32+0xa2/0x100 arch/x86/entry/common.c:178 do_fast_syscall_32+0x37/0x80 arch/x86/entry/common.c:203 do_SYSENTER_32+0x1f/0x30 arch/x86/entry/common.c:246 entry_SYSENTER_compat_after_hwframe+0x70/0x82 Uninit was created at: __alloc_pages+0x9f6/0xe90 mm/page_alloc.c:5572 alloc_pages+0xab0/0xd80 mm/mempolicy.c:2287 __get_free_pages+0x34/0xc0 mm/page_alloc.c:5599 nilfs_ioctl_wrap_copy+0x223/0xc10 fs/nilfs2/ioctl.c:74 nilfs_ioctl_get_info fs/nilfs2/ioctl.c:1173 [inline] nilfs_ioctl+0x2402/0x4450 fs/nilfs2/ioctl.c:1290 nilfs_compat_ioctl+0x1b8/0x200 fs/nilfs2/ioctl.c:1343 __do_compat_sys_ioctl fs/ioctl.c:968 [inline] __se_compat_sys_ioctl+0x7dd/0x1000 fs/ioctl.c:910 __ia32_compat_sys_ioctl+0x93/0xd0 fs/ioctl.c:910 do_syscall_32_irqs_on arch/x86/entry/common.c:112 [inline] __do_fast_syscall_32+0xa2/0x100 arch/x86/entry/common.c:178 do_fast_syscall_32+0x37/0x80 arch/x86/entry/common.c:203 do_SYSENTER_32+0x1f/0x30 arch/x86/entry/common.c:246 entry_SYSENTER_compat_after_hwframe+0x70/0x82 Bytes 16-127 of 3968 are uninitialized ... This eliminates the leak issue by initializing the page allocated as buffer using get_zeroed_page().
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于nilfs_ioctl_wrap_copy函数未初始化缓冲区,可能导致内核信息泄露。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux 003ff182fddde09ddfb8d079bbdb02f9d2122082 ~ a94932381e8dae4117e9129b3c1282e18aa97b05 -
LinuxLinux 2.6.31 -

II. Public POCs for CVE-2023-53035

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2023-53035

登录查看更多情报信息。
Patch · 8

Same Patch Batch · Linux · 2025-05-02 · 107 CVEs total

CVE-2023-53102ice: xsk: disable txq irq before flushing hw
CVE-2023-53115scsi: mpi3mr: Fix memory leaks in mpi3mr_init_ioc()
CVE-2023-53114i40e: Fix kernel crash during reboot when adapter is in recovery mode
CVE-2023-53112drm/i915/sseu: fix max_subslices array-index-out-of-bounds access
CVE-2023-53113wifi: nl80211: fix NULL-ptr deref in offchan check
CVE-2023-53111loop: Fix use-after-free issues
CVE-2023-53109net: tunnels: annotate lockless accesses to dev->needed_headroom
CVE-2023-53110net/smc: fix NULL sndbuf_desc in smc_cdc_tx_handler()
CVE-2023-53108net/iucv: Fix size of interrupt data
CVE-2023-53106nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition
CVE-2023-53107veth: Fix use after free in XDP_REDIRECT
CVE-2023-53105net/mlx5e: Fix cleanup null-ptr deref on encap lock
CVE-2023-53103bonding: restore bond's IFF_SLAVE flag if a non-eth dev enslave fails
CVE-2023-53101ext4: zero i_disksize when initializing the bootloader inode
CVE-2023-53091ext4: update s_journal_inum if it changes after journal replay
CVE-2023-53094tty: serial: fsl_lpuart: fix race on RX DMA shutdown
CVE-2023-53092interconnect: exynos: fix node leak in probe PM QoS error path
CVE-2023-53093tracing: Do not let histogram values have some modifiers
CVE-2023-53095drm/ttm: Fix a NULL pointer dereference
CVE-2023-53090drm/amdkfd: Fix an illegal memory access

Showing top 20 of 107 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2023-53035

No comments yet


Leave a comment