Bug 1225385 (CVE-2023-52848) - VUL-0: CVE-2023-52848: kernel: f2fs: fix to drop meta_inode's page cache in f2fs_put_super()
Summary: VUL-0: CVE-2023-52848: kernel: f2fs: fix to drop meta_inode's page cache in f...
Status: RESOLVED INVALID
Alias: CVE-2023-52848
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P5 - None : Normal
Target Milestone: ---
Assignee: Kernel Bugs
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/407198/
Whiteboard: CVSSv3.1:SUSE:CVE-2023-52848:5.5:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2024-05-27 15:05 UTC by SMASH SMASH
Modified: 2024-05-27 15:05 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description SMASH SMASH 2024-05-27 15:05:28 UTC
In the Linux kernel, the following vulnerability has been resolved:

f2fs: fix to drop meta_inode's page cache in f2fs_put_super()

syzbot reports a kernel bug as below:

F2FS-fs (loop1): detect filesystem reference count leak during umount, type: 10, count: 1
kernel BUG at fs/f2fs/super.c:1639!
CPU: 0 PID: 15451 Comm: syz-executor.1 Not tainted 6.5.0-syzkaller-09338-ge0152e7481c6 #0
RIP: 0010:f2fs_put_super+0xce1/0xed0 fs/f2fs/super.c:1639
Call Trace:
 generic_shutdown_super+0x161/0x3c0 fs/super.c:693
 kill_block_super+0x3b/0x70 fs/super.c:1646
 kill_f2fs_super+0x2b7/0x3d0 fs/f2fs/super.c:4879
 deactivate_locked_super+0x9a/0x170 fs/super.c:481
 deactivate_super+0xde/0x100 fs/super.c:514
 cleanup_mnt+0x222/0x3d0 fs/namespace.c:1254
 task_work_run+0x14d/0x240 kernel/task_work.c:179
 resume_user_mode_work include/linux/resume_user_mode.h:49 [inline]
 exit_to_user_mode_loop kernel/entry/common.c:171 [inline]
 exit_to_user_mode_prepare+0x210/0x240 kernel/entry/common.c:204
 __syscall_exit_to_user_mode_work kernel/entry/common.c:285 [inline]
 syscall_exit_to_user_mode+0x1d/0x60 kernel/entry/common.c:296
 do_syscall_64+0x44/0xb0 arch/x86/entry/common.c:86
 entry_SYSCALL_64_after_hwframe+0x63/0xcd

In f2fs_put_super(), it tries to do sanity check on dirty and IO
reference count of f2fs, once there is any reference count leak,
it will trigger panic.

The root case is, during f2fs_put_super(), if there is any IO error
in f2fs_wait_on_all_pages(), we missed to truncate meta_inode's page
cache later, result in panic, fix this case.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-52848
https://git.kernel.org/pub/scm/linux/security/vulns.git/plain/cve/published/2023/CVE-2023-52848.mbox
https://git.kernel.org/stable/c/eb42e1862aa7934c2c21890097ce4993c5e0d192
https://git.kernel.org/stable/c/10b2a6c0dade67b5a2b2d17fb75c457ea1985fad
https://git.kernel.org/stable/c/a4639380bbe66172df329f8b54aa7d2e943f0f64
https://www.cve.org/CVERecord?id=CVE-2023-52848
https://bugzilla.redhat.com/show_bug.cgi?id=2282721
Comment 1 Carlos López 2024-05-27 15:05:50 UTC
f2fs is not supported in our kernels. Closing.