Rapid7 Vulnerability & Exploit Database

Ubuntu: (Multiple Advisories) (CVE-2023-52603): Linux kernel (OEM) vulnerabilities

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

Ubuntu: (Multiple Advisories) (CVE-2023-52603): Linux kernel (OEM) vulnerabilities

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
03/06/2024
Created
03/13/2024
Added
03/12/2024
Modified
04/25/2024

Description

In the Linux kernel, the following vulnerability has been resolved: UBSAN: array-index-out-of-bounds in dtSplitRoot Syzkaller reported the following issue: oop0: detected capacity change from 0 to 32768 UBSAN: array-index-out-of-bounds in fs/jfs/jfs_dtree.c:1971:9 index -2 is out of range for type 'struct dtslot [128]' CPU: 0 PID: 3613 Comm: syz-executor270 Not tainted 6.0.0-syzkaller-09423-g493ffd6605b2 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 Call Trace: <TASK> __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x1b1/0x28e lib/dump_stack.c:106 ubsan_epilogue lib/ubsan.c:151 [inline] __ubsan_handle_out_of_bounds+0xdb/0x130 lib/ubsan.c:283 dtSplitRoot+0x8d8/0x1900 fs/jfs/jfs_dtree.c:1971 dtSplitUp fs/jfs/jfs_dtree.c:985 [inline] dtInsert+0x1189/0x6b80 fs/jfs/jfs_dtree.c:863 jfs_mkdir+0x757/0xb00 fs/jfs/namei.c:270 vfs_mkdir+0x3b3/0x590 fs/namei.c:4013 do_mkdirat+0x279/0x550 fs/namei.c:4038 __do_sys_mkdirat fs/namei.c:4053 [inline] __se_sys_mkdirat fs/namei.c:4051 [inline] __x64_sys_mkdirat+0x85/0x90 fs/namei.c:4051 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7fcdc0113fd9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ffeb8bc67d8 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fcdc0113fd9 RDX: 0000000000000000 RSI: 0000000020000340 RDI: 0000000000000003 RBP: 00007fcdc00d37a0 R08: 0000000000000000 R09: 00007fcdc00d37a0 R10: 00005555559a72c0 R11: 0000000000000246 R12: 00000000f8008000 R13: 0000000000000000 R14: 00083878000000f8 R15: 0000000000000000 </TASK> The issue is caused when the value of fsi becomes less than -1. The check to break the loop when fsi value becomes -1 is present but syzbot was able to produce value less than -1 which cause the error. This patch simply add the change for the values less than 0. The patch is tested via syzbot.

Solution(s)

  • ubuntu-upgrade-linux-image-4-15-0-1130-oracle
  • ubuntu-upgrade-linux-image-4-15-0-1151-kvm
  • ubuntu-upgrade-linux-image-4-15-0-1161-gcp
  • ubuntu-upgrade-linux-image-4-15-0-1167-aws
  • ubuntu-upgrade-linux-image-4-15-0-1176-azure
  • ubuntu-upgrade-linux-image-4-15-0-224-generic
  • ubuntu-upgrade-linux-image-4-15-0-224-lowlatency
  • ubuntu-upgrade-linux-image-4-4-0-1130-aws
  • ubuntu-upgrade-linux-image-4-4-0-1131-kvm
  • ubuntu-upgrade-linux-image-4-4-0-1168-aws
  • ubuntu-upgrade-linux-image-4-4-0-253-generic
  • ubuntu-upgrade-linux-image-4-4-0-253-lowlatency
  • ubuntu-upgrade-linux-image-5-15-0-1043-gkeop
  • ubuntu-upgrade-linux-image-5-15-0-105-generic
  • ubuntu-upgrade-linux-image-5-15-0-105-generic-64k
  • ubuntu-upgrade-linux-image-5-15-0-105-generic-lpae
  • ubuntu-upgrade-linux-image-5-15-0-105-lowlatency
  • ubuntu-upgrade-linux-image-5-15-0-105-lowlatency-64k
  • ubuntu-upgrade-linux-image-5-15-0-1053-ibm
  • ubuntu-upgrade-linux-image-5-15-0-1053-nvidia
  • ubuntu-upgrade-linux-image-5-15-0-1053-nvidia-lowlatency
  • ubuntu-upgrade-linux-image-5-15-0-1053-raspi
  • ubuntu-upgrade-linux-image-5-15-0-1055-intel-iotg
  • ubuntu-upgrade-linux-image-5-15-0-1057-gke
  • ubuntu-upgrade-linux-image-5-15-0-1057-kvm
  • ubuntu-upgrade-linux-image-5-15-0-1058-aws
  • ubuntu-upgrade-linux-image-5-15-0-1058-gcp
  • ubuntu-upgrade-linux-image-5-15-0-1058-oracle
  • ubuntu-upgrade-linux-image-5-15-0-1060-aws
  • ubuntu-upgrade-linux-image-5-15-0-1061-azure
  • ubuntu-upgrade-linux-image-5-15-0-1061-azure-fde
  • ubuntu-upgrade-linux-image-5-4-0-1035-iot
  • ubuntu-upgrade-linux-image-5-4-0-1042-xilinx-zynqmp
  • ubuntu-upgrade-linux-image-5-4-0-1070-ibm
  • ubuntu-upgrade-linux-image-5-4-0-1083-bluefield
  • ubuntu-upgrade-linux-image-5-4-0-1090-gkeop
  • ubuntu-upgrade-linux-image-5-4-0-1107-raspi
  • ubuntu-upgrade-linux-image-5-4-0-1111-kvm
  • ubuntu-upgrade-linux-image-5-4-0-1122-oracle
  • ubuntu-upgrade-linux-image-5-4-0-1123-aws
  • ubuntu-upgrade-linux-image-5-4-0-1127-gcp
  • ubuntu-upgrade-linux-image-5-4-0-1128-azure
  • ubuntu-upgrade-linux-image-5-4-0-177-generic
  • ubuntu-upgrade-linux-image-5-4-0-177-generic-lpae
  • ubuntu-upgrade-linux-image-5-4-0-177-lowlatency
  • ubuntu-upgrade-linux-image-6-1-0-1035-oem
  • ubuntu-upgrade-linux-image-6-5-0-1012-starfive
  • ubuntu-upgrade-linux-image-6-5-0-1014-laptop
  • ubuntu-upgrade-linux-image-6-5-0-1015-nvidia
  • ubuntu-upgrade-linux-image-6-5-0-1015-nvidia-64k
  • ubuntu-upgrade-linux-image-6-5-0-1015-raspi
  • ubuntu-upgrade-linux-image-6-5-0-1018-aws
  • ubuntu-upgrade-linux-image-6-5-0-1018-gcp
  • ubuntu-upgrade-linux-image-6-5-0-1019-azure
  • ubuntu-upgrade-linux-image-6-5-0-1019-azure-fde
  • ubuntu-upgrade-linux-image-6-5-0-1020-oem
  • ubuntu-upgrade-linux-image-6-5-0-1021-oracle
  • ubuntu-upgrade-linux-image-6-5-0-1021-oracle-64k
  • ubuntu-upgrade-linux-image-6-5-0-28-generic
  • ubuntu-upgrade-linux-image-6-5-0-28-generic-64k
  • ubuntu-upgrade-linux-image-6-5-0-28-lowlatency
  • ubuntu-upgrade-linux-image-6-5-0-28-lowlatency-64k
  • ubuntu-upgrade-linux-image-aws
  • ubuntu-upgrade-linux-image-aws-hwe
  • ubuntu-upgrade-linux-image-aws-lts-18-04
  • ubuntu-upgrade-linux-image-aws-lts-20-04
  • ubuntu-upgrade-linux-image-aws-lts-22-04
  • ubuntu-upgrade-linux-image-azure
  • ubuntu-upgrade-linux-image-azure-cvm
  • ubuntu-upgrade-linux-image-azure-fde
  • ubuntu-upgrade-linux-image-azure-fde-lts-22-04
  • ubuntu-upgrade-linux-image-azure-lts-18-04
  • ubuntu-upgrade-linux-image-azure-lts-20-04
  • ubuntu-upgrade-linux-image-azure-lts-22-04
  • ubuntu-upgrade-linux-image-bluefield
  • ubuntu-upgrade-linux-image-gcp
  • ubuntu-upgrade-linux-image-gcp-lts-18-04
  • ubuntu-upgrade-linux-image-gcp-lts-20-04
  • ubuntu-upgrade-linux-image-gcp-lts-22-04
  • ubuntu-upgrade-linux-image-generic
  • ubuntu-upgrade-linux-image-generic-64k
  • ubuntu-upgrade-linux-image-generic-64k-hwe-20-04
  • ubuntu-upgrade-linux-image-generic-64k-hwe-22-04
  • ubuntu-upgrade-linux-image-generic-hwe-16-04
  • ubuntu-upgrade-linux-image-generic-hwe-18-04
  • ubuntu-upgrade-linux-image-generic-hwe-20-04
  • ubuntu-upgrade-linux-image-generic-hwe-22-04
  • ubuntu-upgrade-linux-image-generic-lpae
  • ubuntu-upgrade-linux-image-generic-lpae-hwe-20-04
  • ubuntu-upgrade-linux-image-generic-lts-xenial
  • ubuntu-upgrade-linux-image-gke
  • ubuntu-upgrade-linux-image-gke-5-15
  • ubuntu-upgrade-linux-image-gkeop
  • ubuntu-upgrade-linux-image-gkeop-5-15
  • ubuntu-upgrade-linux-image-gkeop-5-4
  • ubuntu-upgrade-linux-image-ibm
  • ubuntu-upgrade-linux-image-ibm-lts-20-04
  • ubuntu-upgrade-linux-image-intel
  • ubuntu-upgrade-linux-image-intel-iotg
  • ubuntu-upgrade-linux-image-kvm
  • ubuntu-upgrade-linux-image-laptop-23-10
  • ubuntu-upgrade-linux-image-lowlatency
  • ubuntu-upgrade-linux-image-lowlatency-64k
  • ubuntu-upgrade-linux-image-lowlatency-64k-hwe-20-04
  • ubuntu-upgrade-linux-image-lowlatency-64k-hwe-22-04
  • ubuntu-upgrade-linux-image-lowlatency-hwe-16-04
  • ubuntu-upgrade-linux-image-lowlatency-hwe-18-04
  • ubuntu-upgrade-linux-image-lowlatency-hwe-20-04
  • ubuntu-upgrade-linux-image-lowlatency-hwe-22-04
  • ubuntu-upgrade-linux-image-lowlatency-lts-xenial
  • ubuntu-upgrade-linux-image-nvidia
  • ubuntu-upgrade-linux-image-nvidia-6-5
  • ubuntu-upgrade-linux-image-nvidia-64k-6-5
  • ubuntu-upgrade-linux-image-nvidia-64k-hwe-22-04
  • ubuntu-upgrade-linux-image-nvidia-hwe-22-04
  • ubuntu-upgrade-linux-image-nvidia-lowlatency
  • ubuntu-upgrade-linux-image-oem
  • ubuntu-upgrade-linux-image-oem-20-04
  • ubuntu-upgrade-linux-image-oem-20-04b
  • ubuntu-upgrade-linux-image-oem-20-04c
  • ubuntu-upgrade-linux-image-oem-20-04d
  • ubuntu-upgrade-linux-image-oem-22-04
  • ubuntu-upgrade-linux-image-oem-22-04a
  • ubuntu-upgrade-linux-image-oem-22-04b
  • ubuntu-upgrade-linux-image-oem-22-04c
  • ubuntu-upgrade-linux-image-oem-22-04d
  • ubuntu-upgrade-linux-image-oem-osp1
  • ubuntu-upgrade-linux-image-oracle
  • ubuntu-upgrade-linux-image-oracle-64k
  • ubuntu-upgrade-linux-image-oracle-lts-18-04
  • ubuntu-upgrade-linux-image-oracle-lts-20-04
  • ubuntu-upgrade-linux-image-oracle-lts-22-04
  • ubuntu-upgrade-linux-image-raspi
  • ubuntu-upgrade-linux-image-raspi-hwe-18-04
  • ubuntu-upgrade-linux-image-raspi-nolpae
  • ubuntu-upgrade-linux-image-raspi2
  • ubuntu-upgrade-linux-image-snapdragon-hwe-18-04
  • ubuntu-upgrade-linux-image-starfive
  • ubuntu-upgrade-linux-image-virtual
  • ubuntu-upgrade-linux-image-virtual-hwe-16-04
  • ubuntu-upgrade-linux-image-virtual-hwe-18-04
  • ubuntu-upgrade-linux-image-virtual-hwe-20-04
  • ubuntu-upgrade-linux-image-virtual-hwe-22-04
  • ubuntu-upgrade-linux-image-virtual-lts-xenial
  • ubuntu-upgrade-linux-image-xilinx-zynqmp

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;