Skip to content

Commit 0aa292e

Browse files
committed
Merge: CVE-2024-42305: ext4: check dot and dotdot of dx_root before making dir indexed
MR: https://gitlab.com/redhat/centos-stream/src/kernel/centos-stream-9/-/merge_requests/5043 JIRA: https://issues.redhat.com/browse/RHEL-54964 CVE: CVE-2024-42305 ``` ext4: check dot and dotdot of dx_root before making dir indexed Syzbot reports a issue as follows: ============================================ BUG: unable to handle page fault for address: ffffed11022e24fe PGD 23ffee067 P4D 23ffee067 PUD 0 Oops: Oops: 0000 [#1] PREEMPT SMP KASAN PTI CPU: 0 PID: 5079 Comm: syz-executor306 Not tainted 6.10.0-rc5-g55027e689933 #0 Call Trace: <TASK> make_indexed_dir+0xdaf/0x13c0 fs/ext4/namei.c:2341 ext4_add_entry+0x222a/0x25d0 fs/ext4/namei.c:2451 ext4_rename fs/ext4/namei.c:3936 [inline] ext4_rename2+0x26e5/0x4370 fs/ext4/namei.c:4214 [...] ============================================ The immediate cause of this problem is that there is only one valid dentry for the block to be split during do_split, so split==0 results in out of bounds accesses to the map triggering the issue. do_split unsigned split dx_make_map count = 1 split = count/2 = 0; continued = hash2 == map[split - 1].hash; ---> map[4294967295] The maximum length of a filename is 255 and the minimum block size is 1024, so it is always guaranteed that the number of entries is greater than or equal to 2 when do_split() is called. But syzbot's crafted image has no dot and dotdot in dir, and the dentry distribution in dirblock is as follows: bus dentry1 hole dentry2 free |xx--|xx-------------|...............|xx-------------|...............| 0 12 (8+248)=256 268 256 524 (8+256)=264 788 236 1024 So when renaming dentry1 increases its name_len length by 1, neither hole nor free is sufficient to hold the new dentry, and make_indexed_dir() is called. In make_indexed_dir() it is assumed that the first two entries of the dirblock must be dot and dotdot, so bus and dentry1 are left in dx_root because they are treated as dot and dotdot, and only dentry2 is moved to the new leaf block. That's why count is equal to 1. Therefore add the ext4_check_dx_root() helper function to add more sanity checks to dot and dotdot before starting the conversion to avoid the above issue. Reported-by: syzbot+ae688d469e36fb5138d0@syzkaller.appspotmail.com Closes: https://syzkaller.appspot.com/bug?extid=ae688d469e36fb5138d0 Fixes: ac27a0e ("[PATCH] ext4: initial copy of files from ext3") Cc: stable@kernel.org Signed-off-by: Baokun Li <libaokun1@huawei.com> Reviewed-by: Jan Kara <jack@suse.cz> Link: https://patch.msgid.link/20240702132349.2600605-2-libaokun@huaweicloud.com Signed-off-by: Theodore Ts'o <tytso@mit.edu> (cherry picked from commit 50ea741) ``` Signed-off-by: CKI Backport Bot <cki-ci-bot+cki-gitlab-backport-bot@redhat.com> Approved-by: Carlos Maiolino <cmaiolino@redhat.com> Approved-by: Pavel Reichl <preichl@redhat.com> Approved-by: CKI KWF Bot <cki-ci-bot+kwf-gitlab-com@redhat.com> Merged-by: Rado Vrbovsky <rvrbovsk@redhat.com>
2 parents 66c772d + d8c9e2a commit 0aa292e

File tree

1 file changed

+51
-5
lines changed

1 file changed

+51
-5
lines changed

fs/ext4/namei.c

Lines changed: 51 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2219,6 +2219,52 @@ static int add_dirent_to_buf(handle_t *handle, struct ext4_filename *fname,
22192219
return err ? err : err2;
22202220
}
22212221

2222+
static bool ext4_check_dx_root(struct inode *dir, struct dx_root *root)
2223+
{
2224+
struct fake_dirent *fde;
2225+
const char *error_msg;
2226+
unsigned int rlen;
2227+
unsigned int blocksize = dir->i_sb->s_blocksize;
2228+
char *blockend = (char *)root + dir->i_sb->s_blocksize;
2229+
2230+
fde = &root->dot;
2231+
if (unlikely(fde->name_len != 1)) {
2232+
error_msg = "invalid name_len for '.'";
2233+
goto corrupted;
2234+
}
2235+
if (unlikely(strncmp(root->dot_name, ".", fde->name_len))) {
2236+
error_msg = "invalid name for '.'";
2237+
goto corrupted;
2238+
}
2239+
rlen = ext4_rec_len_from_disk(fde->rec_len, blocksize);
2240+
if (unlikely((char *)fde + rlen >= blockend)) {
2241+
error_msg = "invalid rec_len for '.'";
2242+
goto corrupted;
2243+
}
2244+
2245+
fde = &root->dotdot;
2246+
if (unlikely(fde->name_len != 2)) {
2247+
error_msg = "invalid name_len for '..'";
2248+
goto corrupted;
2249+
}
2250+
if (unlikely(strncmp(root->dotdot_name, "..", fde->name_len))) {
2251+
error_msg = "invalid name for '..'";
2252+
goto corrupted;
2253+
}
2254+
rlen = ext4_rec_len_from_disk(fde->rec_len, blocksize);
2255+
if (unlikely((char *)fde + rlen >= blockend)) {
2256+
error_msg = "invalid rec_len for '..'";
2257+
goto corrupted;
2258+
}
2259+
2260+
return true;
2261+
2262+
corrupted:
2263+
EXT4_ERROR_INODE(dir, "Corrupt dir, %s, running e2fsck is recommended",
2264+
error_msg);
2265+
return false;
2266+
}
2267+
22222268
/*
22232269
* This converts a one block unindexed directory to a 3 block indexed
22242270
* directory, and adds the dentry to the indexed directory.
@@ -2253,17 +2299,17 @@ static int make_indexed_dir(handle_t *handle, struct ext4_filename *fname,
22532299
brelse(bh);
22542300
return retval;
22552301
}
2302+
22562303
root = (struct dx_root *) bh->b_data;
2304+
if (!ext4_check_dx_root(dir, root)) {
2305+
brelse(bh);
2306+
return -EFSCORRUPTED;
2307+
}
22572308

22582309
/* The 0th block becomes the root, move the dirents out */
22592310
fde = &root->dotdot;
22602311
de = (struct ext4_dir_entry_2 *)((char *)fde +
22612312
ext4_rec_len_from_disk(fde->rec_len, blocksize));
2262-
if ((char *) de >= (((char *) root) + blocksize)) {
2263-
EXT4_ERROR_INODE(dir, "invalid rec_len for '..'");
2264-
brelse(bh);
2265-
return -EFSCORRUPTED;
2266-
}
22672313
len = ((char *) root) + (blocksize - csum_size) - (char *) de;
22682314

22692315
/* Allocate new block for the 0th block's dirents */

0 commit comments

Comments
 (0)