-

CVE-2023-53672

In the Linux kernel, the following vulnerability has been resolved:

btrfs: output extra debug info if we failed to find an inline backref

[BUG]
Syzbot reported several warning triggered inside
lookup_inline_extent_backref().

[CAUSE]
As usual, the reproducer doesn't reliably trigger locally here, but at
least we know the WARN_ON() is triggered when an inline backref can not
be found, and it can only be triggered when @insert is true. (I.e.
inserting a new inline backref, which means the backref should already
exist)

[ENHANCEMENT]
After the WARN_ON(), dump all the parameters and the extent tree
leaf to help debug.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < 376b41524b71e494514720bd6114325b0a2ed19c
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 400e08a16604b534fdd82c5a288fa150d04f5f79
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 7afbfde45d665953b4d5a42a721e15bf0315d89b
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < b7c3cf2f6c42e6688b1c37215a0b1663f982f915
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 6994f806c6d1ae8b59344d3700358547f3b3fe1d
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 28062cd6eda04035d8f6ded2001292ac8b496149
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < e70ba449b04b40584bdabb383d10455397cbf177
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 7f72f50547b7af4ddf985b07fc56600a4deba281
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version <= 4.14.*
Version 4.14.326
Status unaffected
Version <= 4.19.*
Version 4.19.295
Status unaffected
Version <= 5.4.*
Version 5.4.257
Status unaffected
Version <= 5.10.*
Version 5.10.197
Status unaffected
Version <= 5.15.*
Version 5.15.133
Status unaffected
Version <= 6.1.*
Version 6.1.55
Status unaffected
Version <= 6.5.*
Version 6.5.5
Status unaffected
Version <= *
Version 6.6
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string