CVE-2023-53172

In the Linux kernel, the following vulnerability has been resolved: fsverity: reject FS_IOC_ENABLE_VERITY on mode 3 fds Commit 56124d6c87fd ("fsverity: support enabling with tree block size < PAGE_SIZE") changed FS_IOC_ENABLE_VERITY to use __kernel_read() to read the file's data, instead of direct pagecache accesses. An unintended consequence of this is that the 'WARN_ON_ONCE(!(file->f_mode & FMODE_READ))' in __kernel_read() became reachable by fuzz tests. This happens if FS_IOC_ENABLE_VERITY is called on a fd opened with access mode 3, which means "ioctl access only". Arguably, FS_IOC_ENABLE_VERITY should work on ioctl-only fds. But ioctl-only fds are a weird Linux extension that is rarely used and that few people even know about. (The documentation for FS_IOC_ENABLE_VERITY even specifically says it requires O_RDONLY.) It's probably not worthwhile to make the ioctl internally open a new fd just to handle this case. Thus, just reject the ioctl on such fds for now.
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:6.3:*:*:*:*:*:*:*

History

02 Dec 2025, 19:09

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:6.3:*:*:*:*:*:*:*
First Time Linux linux Kernel
Linux
CWE NVD-CWE-noinfo
References () https://git.kernel.org/stable/c/04839139213cf60d4c5fc792214a08830e294ff8 - () https://git.kernel.org/stable/c/04839139213cf60d4c5fc792214a08830e294ff8 - Patch
References () https://git.kernel.org/stable/c/85c039cff3c359967cafe90443c02321e950b216 - () https://git.kernel.org/stable/c/85c039cff3c359967cafe90443c02321e950b216 - Patch

Information

Published : 2025-09-15 14:15

Updated : 2025-12-02 19:09


NVD link : CVE-2023-53172

Mitre link : CVE-2023-53172

CVE.ORG link : CVE-2023-53172


JSON object : View

Products Affected

linux

  • linux_kernel