vulnerability

Ubuntu: (Multiple Advisories) (CVE-2023-52603): Linux kernel (OEM) vulnerabilities

Severity
7
CVSS
(AV:L/AC:L/Au:S/C:C/I:C/A:C)
Published
Mar 6, 2024
Added
Mar 12, 2024
Modified
Aug 18, 2025

Description

In the Linux kernel, the following vulnerability has been resolved:

UBSAN: array-index-out-of-bounds in dtSplitRoot

Syzkaller reported the following issue:

oop0: detected capacity change from 0 to 32768

UBSAN: array-index-out-of-bounds in fs/jfs/jfs_dtree.c:1971:9
index -2 is out of range for type 'struct dtslot [128]'
CPU: 0 PID: 3613 Comm: syz-executor270 Not tainted 6.0.0-syzkaller-09423-g493ffd6605b2 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022
Call Trace:
<TASK>
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0x1b1/0x28e lib/dump_stack.c:106
ubsan_epilogue lib/ubsan.c:151 [inline]
__ubsan_handle_out_of_bounds+0xdb/0x130 lib/ubsan.c:283
dtSplitRoot+0x8d8/0x1900 fs/jfs/jfs_dtree.c:1971
dtSplitUp fs/jfs/jfs_dtree.c:985 [inline]
dtInsert+0x1189/0x6b80 fs/jfs/jfs_dtree.c:863
jfs_mkdir+0x757/0xb00 fs/jfs/namei.c:270
vfs_mkdir+0x3b3/0x590 fs/namei.c:4013
do_mkdirat+0x279/0x550 fs/namei.c:4038
__do_sys_mkdirat fs/namei.c:4053 [inline]
__se_sys_mkdirat fs/namei.c:4051 [inline]
__x64_sys_mkdirat+0x85/0x90 fs/namei.c:4051
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7fcdc0113fd9
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ffeb8bc67d8 EFLAGS: 00000246 ORIG_RAX: 0000000000000102
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fcdc0113fd9
RDX: 0000000000000000 RSI: 0000000020000340 RDI: 0000000000000003
RBP: 00007fcdc00d37a0 R08: 0000000000000000 R09: 00007fcdc00d37a0
R10: 00005555559a72c0 R11: 0000000000000246 R12: 00000000f8008000
R13: 0000000000000000 R14: 00083878000000f8 R15: 0000000000000000
</TASK>

The issue is caused when the value of fsi becomes less than -1.
The check to break the loop when fsi value becomes -1 is present
but syzbot was able to produce value less than -1 which cause the error.
This patch simply add the change for the values less than 0.

The patch is tested via syzbot.

Solutions

ubuntu-upgrade-linux-image-4-15-0-1130-oracleubuntu-upgrade-linux-image-4-15-0-1151-kvmubuntu-upgrade-linux-image-4-15-0-1161-gcpubuntu-upgrade-linux-image-4-15-0-1167-awsubuntu-upgrade-linux-image-4-15-0-1176-azureubuntu-upgrade-linux-image-4-15-0-224-genericubuntu-upgrade-linux-image-4-15-0-224-lowlatencyubuntu-upgrade-linux-image-4-4-0-1130-awsubuntu-upgrade-linux-image-4-4-0-1131-kvmubuntu-upgrade-linux-image-4-4-0-1168-awsubuntu-upgrade-linux-image-4-4-0-253-genericubuntu-upgrade-linux-image-4-4-0-253-lowlatencyubuntu-upgrade-linux-image-5-15-0-1043-gkeopubuntu-upgrade-linux-image-5-15-0-105-genericubuntu-upgrade-linux-image-5-15-0-105-generic-64kubuntu-upgrade-linux-image-5-15-0-105-generic-lpaeubuntu-upgrade-linux-image-5-15-0-105-lowlatencyubuntu-upgrade-linux-image-5-15-0-105-lowlatency-64kubuntu-upgrade-linux-image-5-15-0-1053-ibmubuntu-upgrade-linux-image-5-15-0-1053-nvidiaubuntu-upgrade-linux-image-5-15-0-1053-nvidia-lowlatencyubuntu-upgrade-linux-image-5-15-0-1053-raspiubuntu-upgrade-linux-image-5-15-0-1055-intel-iotgubuntu-upgrade-linux-image-5-15-0-1057-gkeubuntu-upgrade-linux-image-5-15-0-1057-kvmubuntu-upgrade-linux-image-5-15-0-1058-awsubuntu-upgrade-linux-image-5-15-0-1058-gcpubuntu-upgrade-linux-image-5-15-0-1058-oracleubuntu-upgrade-linux-image-5-15-0-1060-awsubuntu-upgrade-linux-image-5-15-0-1061-azureubuntu-upgrade-linux-image-5-15-0-1061-azure-fdeubuntu-upgrade-linux-image-5-4-0-1035-iotubuntu-upgrade-linux-image-5-4-0-1042-xilinx-zynqmpubuntu-upgrade-linux-image-5-4-0-1070-ibmubuntu-upgrade-linux-image-5-4-0-1083-bluefieldubuntu-upgrade-linux-image-5-4-0-1090-gkeopubuntu-upgrade-linux-image-5-4-0-1107-raspiubuntu-upgrade-linux-image-5-4-0-1111-kvmubuntu-upgrade-linux-image-5-4-0-1122-oracleubuntu-upgrade-linux-image-5-4-0-1123-awsubuntu-upgrade-linux-image-5-4-0-1127-gcpubuntu-upgrade-linux-image-5-4-0-1128-azureubuntu-upgrade-linux-image-5-4-0-177-genericubuntu-upgrade-linux-image-5-4-0-177-generic-lpaeubuntu-upgrade-linux-image-5-4-0-177-lowlatencyubuntu-upgrade-linux-image-6-1-0-1035-oemubuntu-upgrade-linux-image-6-5-0-1012-starfiveubuntu-upgrade-linux-image-6-5-0-1014-laptopubuntu-upgrade-linux-image-6-5-0-1015-nvidiaubuntu-upgrade-linux-image-6-5-0-1015-nvidia-64kubuntu-upgrade-linux-image-6-5-0-1015-raspiubuntu-upgrade-linux-image-6-5-0-1018-awsubuntu-upgrade-linux-image-6-5-0-1018-gcpubuntu-upgrade-linux-image-6-5-0-1019-azureubuntu-upgrade-linux-image-6-5-0-1019-azure-fdeubuntu-upgrade-linux-image-6-5-0-1020-oemubuntu-upgrade-linux-image-6-5-0-1021-oracleubuntu-upgrade-linux-image-6-5-0-1021-oracle-64kubuntu-upgrade-linux-image-6-5-0-28-genericubuntu-upgrade-linux-image-6-5-0-28-generic-64kubuntu-upgrade-linux-image-6-5-0-28-lowlatencyubuntu-upgrade-linux-image-6-5-0-28-lowlatency-64kubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-aws-hweubuntu-upgrade-linux-image-aws-lts-18-04ubuntu-upgrade-linux-image-aws-lts-20-04ubuntu-upgrade-linux-image-aws-lts-22-04ubuntu-upgrade-linux-image-azureubuntu-upgrade-linux-image-azure-cvmubuntu-upgrade-linux-image-azure-fdeubuntu-upgrade-linux-image-azure-fde-lts-22-04ubuntu-upgrade-linux-image-azure-lts-18-04ubuntu-upgrade-linux-image-azure-lts-20-04ubuntu-upgrade-linux-image-azure-lts-22-04ubuntu-upgrade-linux-image-bluefieldubuntu-upgrade-linux-image-gcpubuntu-upgrade-linux-image-gcp-lts-18-04ubuntu-upgrade-linux-image-gcp-lts-20-04ubuntu-upgrade-linux-image-gcp-lts-22-04ubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-64kubuntu-upgrade-linux-image-generic-64k-hwe-20-04ubuntu-upgrade-linux-image-generic-64k-hwe-22-04ubuntu-upgrade-linux-image-generic-hwe-16-04ubuntu-upgrade-linux-image-generic-hwe-18-04ubuntu-upgrade-linux-image-generic-hwe-20-04ubuntu-upgrade-linux-image-generic-hwe-22-04ubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-generic-lpae-hwe-20-04ubuntu-upgrade-linux-image-generic-lts-xenialubuntu-upgrade-linux-image-gkeubuntu-upgrade-linux-image-gke-5-15ubuntu-upgrade-linux-image-gkeopubuntu-upgrade-linux-image-gkeop-5-15ubuntu-upgrade-linux-image-gkeop-5-4ubuntu-upgrade-linux-image-ibmubuntu-upgrade-linux-image-ibm-lts-20-04ubuntu-upgrade-linux-image-intelubuntu-upgrade-linux-image-intel-iotgubuntu-upgrade-linux-image-kvmubuntu-upgrade-linux-image-laptop-23-10ubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-64kubuntu-upgrade-linux-image-lowlatency-64k-hwe-20-04ubuntu-upgrade-linux-image-lowlatency-64k-hwe-22-04ubuntu-upgrade-linux-image-lowlatency-hwe-16-04ubuntu-upgrade-linux-image-lowlatency-hwe-18-04ubuntu-upgrade-linux-image-lowlatency-hwe-20-04ubuntu-upgrade-linux-image-lowlatency-hwe-22-04ubuntu-upgrade-linux-image-lowlatency-lts-xenialubuntu-upgrade-linux-image-nvidiaubuntu-upgrade-linux-image-nvidia-6-5ubuntu-upgrade-linux-image-nvidia-64k-6-5ubuntu-upgrade-linux-image-nvidia-64k-hwe-22-04ubuntu-upgrade-linux-image-nvidia-hwe-22-04ubuntu-upgrade-linux-image-nvidia-lowlatencyubuntu-upgrade-linux-image-oemubuntu-upgrade-linux-image-oem-20-04ubuntu-upgrade-linux-image-oem-20-04bubuntu-upgrade-linux-image-oem-20-04cubuntu-upgrade-linux-image-oem-20-04dubuntu-upgrade-linux-image-oem-22-04ubuntu-upgrade-linux-image-oem-22-04aubuntu-upgrade-linux-image-oem-22-04bubuntu-upgrade-linux-image-oem-22-04cubuntu-upgrade-linux-image-oem-22-04dubuntu-upgrade-linux-image-oem-osp1ubuntu-upgrade-linux-image-oracleubuntu-upgrade-linux-image-oracle-64kubuntu-upgrade-linux-image-oracle-lts-18-04ubuntu-upgrade-linux-image-oracle-lts-20-04ubuntu-upgrade-linux-image-oracle-lts-22-04ubuntu-upgrade-linux-image-raspiubuntu-upgrade-linux-image-raspi-hwe-18-04ubuntu-upgrade-linux-image-raspi-nolpaeubuntu-upgrade-linux-image-raspi2ubuntu-upgrade-linux-image-snapdragon-hwe-18-04ubuntu-upgrade-linux-image-starfiveubuntu-upgrade-linux-image-virtualubuntu-upgrade-linux-image-virtual-hwe-16-04ubuntu-upgrade-linux-image-virtual-hwe-18-04ubuntu-upgrade-linux-image-virtual-hwe-20-04ubuntu-upgrade-linux-image-virtual-hwe-22-04ubuntu-upgrade-linux-image-virtual-lts-xenialubuntu-upgrade-linux-image-xilinx-zynqmp

References

    Title
    NEW

    Explore Exposure Command

    Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.