CVE-2023-53339

In the Linux kernel, the following vulnerability has been resolved: btrfs: fix BUG_ON condition in btrfs_cancel_balance Pausing and canceling balance can race to interrupt balance lead to BUG_ON panic in btrfs_cancel_balance. The BUG_ON condition in btrfs_cancel_balance does not take this race scenario into account. However, the race condition has no other side effects. We can fix that. Reproducing it with panic trace like this: kernel BUG at fs/btrfs/volumes.c:4618! RIP: 0010:btrfs_cancel_balance+0x5cf/0x6a0 Call Trace: <TASK> ? do_nanosleep+0x60/0x120 ? hrtimer_nanosleep+0xb7/0x1a0 ? sched_core_clone_cookie+0x70/0x70 btrfs_ioctl_balance_ctl+0x55/0x70 btrfs_ioctl+0xa46/0xd20 __x64_sys_ioctl+0x7d/0xa0 do_syscall_64+0x38/0x80 entry_SYSCALL_64_after_hwframe+0x63/0xcd Race scenario as follows: > mutex_unlock(&fs_info->balance_mutex); > -------------------- > .......issue pause and cancel req in another thread > -------------------- > ret = __btrfs_balance(fs_info); > > mutex_lock(&fs_info->balance_mutex); > if (ret == -ECANCELED && atomic_read(&fs_info->balance_pause_req)) { > btrfs_info(fs_info, "balance: paused"); > btrfs_exclop_balance(fs_info, BTRFS_EXCLOP_BALANCE_PAUSED); > }
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.5:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.5:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.5:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.5:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.5:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.5:rc6:*:*:*:*:*:*

History

11 Dec 2025, 15:45

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/29eefa6d0d07e185f7bfe9576f91e6dba98189c2 - () https://git.kernel.org/stable/c/29eefa6d0d07e185f7bfe9576f91e6dba98189c2 - Patch
References () https://git.kernel.org/stable/c/7c93b89cd46636b5e74c12fa21dd86167bc6ea8d - () https://git.kernel.org/stable/c/7c93b89cd46636b5e74c12fa21dd86167bc6ea8d - Patch
References () https://git.kernel.org/stable/c/a0a462a0f20926918d6009f0b4b25673e883fc98 - () https://git.kernel.org/stable/c/a0a462a0f20926918d6009f0b4b25673e883fc98 - Patch
References () https://git.kernel.org/stable/c/ae81329f7de3aa6f34ecdfa5412e72161a30e9ce - () https://git.kernel.org/stable/c/ae81329f7de3aa6f34ecdfa5412e72161a30e9ce - Patch
References () https://git.kernel.org/stable/c/b966e9e1e250dfdb41a7f41775faea4a37af923c - () https://git.kernel.org/stable/c/b966e9e1e250dfdb41a7f41775faea4a37af923c - Patch
References () https://git.kernel.org/stable/c/bd7bef82ce0e929ef4cf63a34990545aaca28077 - () https://git.kernel.org/stable/c/bd7bef82ce0e929ef4cf63a34990545aaca28077 - Patch
References () https://git.kernel.org/stable/c/ceb9ba8e30833a4823e2dc73f80ebcdf2498d01a - () https://git.kernel.org/stable/c/ceb9ba8e30833a4823e2dc73f80ebcdf2498d01a - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:6.5:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.5:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.5:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.5:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.5:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.5:rc3:*:*:*:*:*:*
CWE CWE-617
First Time Linux
Linux linux Kernel

17 Sep 2025, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-17 15:15

Updated : 2025-12-11 15:45


NVD link : CVE-2023-53339

Mitre link : CVE-2023-53339

CVE.ORG link : CVE-2023-53339


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-617

Reachable Assertion