cve-2024-57923
Vulnerability from cvelistv5
Published
2025-01-19 11:52
Modified
2025-01-20 06:29
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: btrfs: zlib: fix avail_in bytes for s390 zlib HW compression path Since the input data length passed to zlib_compress_folios() can be arbitrary, always setting strm.avail_in to a multiple of PAGE_SIZE may cause read-in bytes to exceed the input range. Currently this triggers an assert in btrfs_compress_folios() on the debug kernel (see below). Fix strm.avail_in calculation for S390 hardware acceleration path. assertion failed: *total_in <= orig_len, in fs/btrfs/compression.c:1041 ------------[ cut here ]------------ kernel BUG at fs/btrfs/compression.c:1041! monitor event: 0040 ilc:2 [#1] PREEMPT SMP CPU: 16 UID: 0 PID: 325 Comm: kworker/u273:3 Not tainted 6.13.0-20241204.rc1.git6.fae3b21430ca.300.fc41.s390x+debug #1 Hardware name: IBM 3931 A01 703 (z/VM 7.4.0) Workqueue: btrfs-delalloc btrfs_work_helper Krnl PSW : 0704d00180000000 0000021761df6538 (btrfs_compress_folios+0x198/0x1a0) R:0 T:1 IO:1 EX:1 Key:0 M:1 W:0 P:0 AS:3 CC:1 PM:0 RI:0 EA:3 Krnl GPRS: 0000000080000000 0000000000000001 0000000000000047 0000000000000000 0000000000000006 ffffff01757bb000 000001976232fcc0 000000000000130c 000001976232fcd0 000001976232fcc8 00000118ff4a0e30 0000000000000001 00000111821ab400 0000011100000000 0000021761df6534 000001976232fb58 Krnl Code: 0000021761df6528: c020006f5ef4 larl %r2,0000021762be2310 0000021761df652e: c0e5ffbd09d5 brasl %r14,00000217615978d8 #0000021761df6534: af000000 mc 0,0 >0000021761df6538: 0707 bcr 0,%r7 0000021761df653a: 0707 bcr 0,%r7 0000021761df653c: 0707 bcr 0,%r7 0000021761df653e: 0707 bcr 0,%r7 0000021761df6540: c004004bb7ec brcl 0,000002176276d518 Call Trace: [<0000021761df6538>] btrfs_compress_folios+0x198/0x1a0 ([<0000021761df6534>] btrfs_compress_folios+0x194/0x1a0) [<0000021761d97788>] compress_file_range+0x3b8/0x6d0 [<0000021761dcee7c>] btrfs_work_helper+0x10c/0x160 [<0000021761645760>] process_one_work+0x2b0/0x5d0 [<000002176164637e>] worker_thread+0x20e/0x3e0 [<000002176165221a>] kthread+0x15a/0x170 [<00000217615b859c>] __ret_from_fork+0x3c/0x60 [<00000217626e72d2>] ret_from_fork+0xa/0x38 INFO: lockdep is turned off. Last Breaking-Event-Address: [<0000021761597924>] _printk+0x4c/0x58 Kernel panic - not syncing: Fatal exception: panic_on_oops
Impacted products
Vendor Product Version
Linux Linux Version: fd1e75d0105d2289e24b6d63cee49e6f7952c8bf
Version: fd1e75d0105d2289e24b6d63cee49e6f7952c8bf
Create a notification for this product.
   Linux Linux Version: 6.12
Create a notification for this product.
Show details on NVD website


{
   containers: {
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "Linux",
               programFiles: [
                  "fs/btrfs/zlib.c",
               ],
               repo: "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
               vendor: "Linux",
               versions: [
                  {
                     lessThan: "25adbb08aeadcff883ab801df99fd20fefbb6ca4",
                     status: "affected",
                     version: "fd1e75d0105d2289e24b6d63cee49e6f7952c8bf",
                     versionType: "git",
                  },
                  {
                     lessThan: "0ee4736c003daded513de0ff112d4a1e9c85bbab",
                     status: "affected",
                     version: "fd1e75d0105d2289e24b6d63cee49e6f7952c8bf",
                     versionType: "git",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               product: "Linux",
               programFiles: [
                  "fs/btrfs/zlib.c",
               ],
               repo: "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
               vendor: "Linux",
               versions: [
                  {
                     status: "affected",
                     version: "6.12",
                  },
                  {
                     lessThan: "6.12",
                     status: "unaffected",
                     version: "0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.12.*",
                     status: "unaffected",
                     version: "6.12.10",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "*",
                     status: "unaffected",
                     version: "6.13",
                     versionType: "original_commit_for_fix",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: zlib: fix avail_in bytes for s390 zlib HW compression path\n\nSince the input data length passed to zlib_compress_folios() can be\narbitrary, always setting strm.avail_in to a multiple of PAGE_SIZE may\ncause read-in bytes to exceed the input range. Currently this triggers\nan assert in btrfs_compress_folios() on the debug kernel (see below).\nFix strm.avail_in calculation for S390 hardware acceleration path.\n\n  assertion failed: *total_in <= orig_len, in fs/btrfs/compression.c:1041\n  ------------[ cut here ]------------\n  kernel BUG at fs/btrfs/compression.c:1041!\n  monitor event: 0040 ilc:2 [#1] PREEMPT SMP\n  CPU: 16 UID: 0 PID: 325 Comm: kworker/u273:3 Not tainted 6.13.0-20241204.rc1.git6.fae3b21430ca.300.fc41.s390x+debug #1\n  Hardware name: IBM 3931 A01 703 (z/VM 7.4.0)\n  Workqueue: btrfs-delalloc btrfs_work_helper\n  Krnl PSW : 0704d00180000000 0000021761df6538 (btrfs_compress_folios+0x198/0x1a0)\n             R:0 T:1 IO:1 EX:1 Key:0 M:1 W:0 P:0 AS:3 CC:1 PM:0 RI:0 EA:3\n  Krnl GPRS: 0000000080000000 0000000000000001 0000000000000047 0000000000000000\n             0000000000000006 ffffff01757bb000 000001976232fcc0 000000000000130c\n             000001976232fcd0 000001976232fcc8 00000118ff4a0e30 0000000000000001\n             00000111821ab400 0000011100000000 0000021761df6534 000001976232fb58\n  Krnl Code: 0000021761df6528: c020006f5ef4        larl    %r2,0000021762be2310\n             0000021761df652e: c0e5ffbd09d5        brasl   %r14,00000217615978d8\n            #0000021761df6534: af000000            mc      0,0\n            >0000021761df6538: 0707                bcr     0,%r7\n             0000021761df653a: 0707                bcr     0,%r7\n             0000021761df653c: 0707                bcr     0,%r7\n             0000021761df653e: 0707                bcr     0,%r7\n             0000021761df6540: c004004bb7ec        brcl    0,000002176276d518\n  Call Trace:\n   [<0000021761df6538>] btrfs_compress_folios+0x198/0x1a0\n  ([<0000021761df6534>] btrfs_compress_folios+0x194/0x1a0)\n   [<0000021761d97788>] compress_file_range+0x3b8/0x6d0\n   [<0000021761dcee7c>] btrfs_work_helper+0x10c/0x160\n   [<0000021761645760>] process_one_work+0x2b0/0x5d0\n   [<000002176164637e>] worker_thread+0x20e/0x3e0\n   [<000002176165221a>] kthread+0x15a/0x170\n   [<00000217615b859c>] __ret_from_fork+0x3c/0x60\n   [<00000217626e72d2>] ret_from_fork+0xa/0x38\n  INFO: lockdep is turned off.\n  Last Breaking-Event-Address:\n   [<0000021761597924>] _printk+0x4c/0x58\n  Kernel panic - not syncing: Fatal exception: panic_on_oops",
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-20T06:29:37.997Z",
            orgId: "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
            shortName: "Linux",
         },
         references: [
            {
               url: "https://git.kernel.org/stable/c/25adbb08aeadcff883ab801df99fd20fefbb6ca4",
            },
            {
               url: "https://git.kernel.org/stable/c/0ee4736c003daded513de0ff112d4a1e9c85bbab",
            },
         ],
         title: "btrfs: zlib: fix avail_in bytes for s390 zlib HW compression path",
         x_generator: {
            engine: "bippy-5f407fcff5a0",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
      assignerShortName: "Linux",
      cveId: "CVE-2024-57923",
      datePublished: "2025-01-19T11:52:41.798Z",
      dateReserved: "2025-01-19T11:50:08.376Z",
      dateUpdated: "2025-01-20T06:29:37.997Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
   "vulnerability-lookup:meta": {
      nvd: "{\"cve\":{\"id\":\"CVE-2024-57923\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-01-19T12:15:26.433\",\"lastModified\":\"2025-01-19T12:15:26.433\",\"vulnStatus\":\"Received\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nbtrfs: zlib: fix avail_in bytes for s390 zlib HW compression path\\n\\nSince the input data length passed to zlib_compress_folios() can be\\narbitrary, always setting strm.avail_in to a multiple of PAGE_SIZE may\\ncause read-in bytes to exceed the input range. Currently this triggers\\nan assert in btrfs_compress_folios() on the debug kernel (see below).\\nFix strm.avail_in calculation for S390 hardware acceleration path.\\n\\n  assertion failed: *total_in <= orig_len, in fs/btrfs/compression.c:1041\\n  ------------[ cut here ]------------\\n  kernel BUG at fs/btrfs/compression.c:1041!\\n  monitor event: 0040 ilc:2 [#1] PREEMPT SMP\\n  CPU: 16 UID: 0 PID: 325 Comm: kworker/u273:3 Not tainted 6.13.0-20241204.rc1.git6.fae3b21430ca.300.fc41.s390x+debug #1\\n  Hardware name: IBM 3931 A01 703 (z/VM 7.4.0)\\n  Workqueue: btrfs-delalloc btrfs_work_helper\\n  Krnl PSW : 0704d00180000000 0000021761df6538 (btrfs_compress_folios+0x198/0x1a0)\\n             R:0 T:1 IO:1 EX:1 Key:0 M:1 W:0 P:0 AS:3 CC:1 PM:0 RI:0 EA:3\\n  Krnl GPRS: 0000000080000000 0000000000000001 0000000000000047 0000000000000000\\n             0000000000000006 ffffff01757bb000 000001976232fcc0 000000000000130c\\n             000001976232fcd0 000001976232fcc8 00000118ff4a0e30 0000000000000001\\n             00000111821ab400 0000011100000000 0000021761df6534 000001976232fb58\\n  Krnl Code: 0000021761df6528: c020006f5ef4        larl    %r2,0000021762be2310\\n             0000021761df652e: c0e5ffbd09d5        brasl   %r14,00000217615978d8\\n            #0000021761df6534: af000000            mc      0,0\\n            >0000021761df6538: 0707                bcr     0,%r7\\n             0000021761df653a: 0707                bcr     0,%r7\\n             0000021761df653c: 0707                bcr     0,%r7\\n             0000021761df653e: 0707                bcr     0,%r7\\n             0000021761df6540: c004004bb7ec        brcl    0,000002176276d518\\n  Call Trace:\\n   [<0000021761df6538>] btrfs_compress_folios+0x198/0x1a0\\n  ([<0000021761df6534>] btrfs_compress_folios+0x194/0x1a0)\\n   [<0000021761d97788>] compress_file_range+0x3b8/0x6d0\\n   [<0000021761dcee7c>] btrfs_work_helper+0x10c/0x160\\n   [<0000021761645760>] process_one_work+0x2b0/0x5d0\\n   [<000002176164637e>] worker_thread+0x20e/0x3e0\\n   [<000002176165221a>] kthread+0x15a/0x170\\n   [<00000217615b859c>] __ret_from_fork+0x3c/0x60\\n   [<00000217626e72d2>] ret_from_fork+0xa/0x38\\n  INFO: lockdep is turned off.\\n  Last Breaking-Event-Address:\\n   [<0000021761597924>] _printk+0x4c/0x58\\n  Kernel panic - not syncing: Fatal exception: panic_on_oops\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/0ee4736c003daded513de0ff112d4a1e9c85bbab\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/25adbb08aeadcff883ab801df99fd20fefbb6ca4\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}",
   },
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.