DEBIAN-CVE-2023-53172

Source
https://security-tracker.debian.org/tracker/CVE-2023-53172
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2023-53172.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2023-53172
Upstream
Published
2025-09-15T14:15:39.057Z
Modified
2026-03-11T07:35:03.862754Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved: fsverity: reject FSIOCENABLEVERITY on mode 3 fds Commit 56124d6c87fd ("fsverity: support enabling with tree block size < PAGESIZE") changed FSIOCENABLE_VERITY to use __kernelread() to read the file's data, instead of direct pagecache accesses. An unintended consequence of this is that the 'WARNONONCE(!(file->fmode & FMODE_READ))' in _kernelread() became reachable by fuzz tests. This happens if FSIOCENABLEVERITY is called on a fd opened with access mode 3, which means "ioctl access only". Arguably, FSIOCENABLEVERITY should work on ioctl-only fds. But ioctl-only fds are a weird Linux extension that is rarely used and that few people even know about. (The documentation for FSIOCENABLEVERITY even specifically says it requires ORDONLY.) It's probably not worthwhile to make the ioctl internally open a new fd just to handle this case. Thus, just reject the ioctl on such fds for now.

References

Affected packages

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.3.7-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2023-53172.json"

Debian:14 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.3.7-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2023-53172.json"