Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      React.js for SaaS Platforms: How Top Development Teams Help Startups Launch Faster

      August 3, 2025

      Upwork Freelancers vs Dedicated React.js Teams: What’s Better for Your Project in 2025?

      August 1, 2025

      Is Agile dead in the age of AI?

      August 1, 2025

      Top 15 Enterprise Use Cases That Justify Hiring Node.js Developers in 2025

      July 31, 2025

      Unplugging these 7 common household devices helped reduce my electricity bills

      August 3, 2025

      DistroWatch Weekly, Issue 1133

      August 3, 2025

      Anthropic beats OpenAI as the top LLM provider for business – and it’s not even close

      August 2, 2025

      I bought Samsung’s Galaxy Watch Ultra 2025 – here’s why I have buyer’s remorse

      August 2, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The details of TC39’s last meeting

      August 3, 2025
      Recent

      The details of TC39’s last meeting

      August 3, 2025

      Enhancing Laravel Queries with Reusable Scope Patterns

      August 1, 2025

      Everything We Know About Livewire 4

      August 1, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      DistroWatch Weekly, Issue 1133

      August 3, 2025
      Recent

      DistroWatch Weekly, Issue 1133

      August 3, 2025

      Newelle, a ‘Virtual Assistant’ for GNOME, Hits Version 1.0

      August 3, 2025

      Bustle – visualize D-Bus activity

      August 3, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Security»Common Vulnerabilities and Exposures (CVEs)»CVE-2023-53143 – “Ext4 Linux Kernel Off-by-One Error in fsmap Handling”

    CVE-2023-53143 – “Ext4 Linux Kernel Off-by-One Error in fsmap Handling”

    May 2, 2025

    CVE ID : CVE-2023-53143

    Published : May 2, 2025, 4:15 p.m. | 34 minutes ago

    Description : In the Linux kernel, the following vulnerability has been resolved:

    ext4: fix another off-by-one fsmap error on 1k block filesystems

    Apparently syzbot figured out that issuing this FSMAP call:

    struct fsmap_head cmd = {
    .fmh_count = …;
    .fmh_keys = {
    { .fmr_device = /* ext4 dev */, .fmr_physical = 0, },
    { .fmr_device = /* ext4 dev */, .fmr_physical = 0, },
    },
    …
    };
    ret = ioctl(fd, FS_IOC_GETFSMAP, &cmd);

    Produces this crash if the underlying filesystem is a 1k-block ext4
    filesystem:

    kernel BUG at fs/ext4/ext4.h:3331!
    invalid opcode: 0000 [#1] PREEMPT SMP
    CPU: 3 PID: 3227965 Comm: xfs_io Tainted: G W O 6.2.0-rc8-achx
    Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.15.0-1 04/01/2014
    RIP: 0010:ext4_mb_load_buddy_gfp+0x47c/0x570 [ext4]
    RSP: 0018:ffffc90007c03998 EFLAGS: 00010246
    RAX: ffff888004978000 RBX: ffffc90007c03a20 RCX: ffff888041618000
    RDX: 0000000000000000 RSI: 00000000000005a4 RDI: ffffffffa0c99b11
    RBP: ffff888012330000 R08: ffffffffa0c2b7d0 R09: 0000000000000400
    R10: ffffc90007c03950 R11: 0000000000000000 R12: 0000000000000001
    R13: 00000000ffffffff R14: 0000000000000c40 R15: ffff88802678c398
    FS: 00007fdf2020c880(0000) GS:ffff88807e100000(0000) knlGS:0000000000000000
    CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
    CR2: 00007ffd318a5fe8 CR3: 000000007f80f001 CR4: 00000000001706e0
    Call Trace:

    ext4_mballoc_query_range+0x4b/0x210 [ext4 dfa189daddffe8fecd3cdfd00564e0f265a8ab80]
    ext4_getfsmap_datadev+0x713/0x890 [ext4 dfa189daddffe8fecd3cdfd00564e0f265a8ab80]
    ext4_getfsmap+0x2b7/0x330 [ext4 dfa189daddffe8fecd3cdfd00564e0f265a8ab80]
    ext4_ioc_getfsmap+0x153/0x2b0 [ext4 dfa189daddffe8fecd3cdfd00564e0f265a8ab80]
    __ext4_ioctl+0x2a7/0x17e0 [ext4 dfa189daddffe8fecd3cdfd00564e0f265a8ab80]
    __x64_sys_ioctl+0x82/0xa0
    do_syscall_64+0x2b/0x80
    entry_SYSCALL_64_after_hwframe+0x46/0xb0
    RIP: 0033:0x7fdf20558aff
    RSP: 002b:00007ffd318a9e30 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
    RAX: ffffffffffffffda RBX: 00000000000200c0 RCX: 00007fdf20558aff
    RDX: 00007fdf1feb2010 RSI: 00000000c0c0583b RDI: 0000000000000003
    RBP: 00005625c0634be0 R08: 00005625c0634c40 R09: 0000000000000001
    R10: 0000000000000000 R11: 0000000000000246 R12: 00007fdf1feb2010
    R13: 00005625be70d994 R14: 0000000000000800 R15: 0000000000000000

    For GETFSMAP calls, the caller selects a physical block device by
    writing its block number into fsmap_head.fmh_keys[01].fmr_device.
    To query mappings for a subrange of the device, the starting byte of the
    range is written to fsmap_head.fmh_keys[0].fmr_physical and the last
    byte of the range goes in fsmap_head.fmh_keys[1].fmr_physical.

    IOWs, to query what mappings overlap with bytes 3-14 of /dev/sda, you’d
    set the inputs as follows:

    fmh_keys[0] = { .fmr_device = major(8, 0), .fmr_physical = 3},
    fmh_keys[1] = { .fmr_device = major(8, 0), .fmr_physical = 14},

    Which would return you whatever is mapped in the 12 bytes starting at
    physical offset 3.

    The crash is due to insufficient range validation of keys[1] in
    ext4_getfsmap_datadev. On 1k-block filesystems, block 0 is not part of
    the filesystem, which means that s_first_data_block is nonzero.
    ext4_get_group_no_and_offset subtracts this quantity from the blocknr
    argument before cracking it into a group number and a block number
    within a group. IOWs, block group 0 spans blocks 1-8192 (1-based)
    instead of 0-8191 (0-based) like what happens with larger blocksizes.

    The net result of this encoding is that blocknr s_first_data_block);

    The division then operates on -1:

    offset = do_div(blocknr, EXT4_BLOCKS_PER_GROUP(sb)) >>
    EXT4_SB(sb)->s_cluster_bits;

    Leaving an impossibly large group number (2^32-1) in blocknr.
    ext4_getfsmap_check_keys checked that keys[0
    —truncated—

    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCVE-2023-53144 – Linux Kernel erofs LZMA HIGHMEM NULL Pointer Dereference Vulnerability
    Next Article CVE-2023-53142 – “Ice: Buffer Overflow in ice_get_module_eeprom()”

    Related Posts

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-6754 – “WordPress SEO Metrics Privilege Escalation”

    August 3, 2025
    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-7710 – “Brave Conversion Engine WordPress Facebook Authentication Bypass”

    August 3, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    Student Record Android App using SQLite

    Development

    CodeSOD: All Locked Up

    News & Updates

    CVE-2025-3870 – “1 Decembrie 1918 WordPress CSRF”

    Common Vulnerabilities and Exposures (CVEs)

    How to Activate Your Django Virtual Environment

    Development

    Highlights

    CVE-2025-46738 – Apache SEL arbitrary code execution vulnerability

    May 12, 2025

    CVE ID : CVE-2025-46738

    Published : May 12, 2025, 4:15 p.m. | 19 minutes ago

    Description : An authenticated attacker can maliciously modify layout data files in the SEL-5033 installation directory to execute arbitrary code.

    Severity: 6.6 | MEDIUM

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    CVE-2025-5202 – Open Asset Import Library Assimp Out-of-Bounds Read Vulnerability

    May 26, 2025

    RansomHub Went Dark April 1; Affiliates Fled to Qilin, DragonForce Claimed Control

    April 30, 2025

    CVE-2025-7598 – Tenda AX1803 Stack-Based Buffer Overflow Vulnerability

    July 14, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.