ACK: [SRU][B/hwe][CVE-2020-14314][PATCH 0/1] CVE-2020-14314 fix
Andrea Righi
andrea.righi at canonical.com
Thu Nov 5 07:39:07 UTC 2020
On Wed, Nov 04, 2020 at 05:59:15PM -0700, Kelsey Skunberg wrote:
> CVE-2020-14314
>
> SRU Justification:
>
> [Impact]
>
> A memory out-of-bounds read flaw was found in the Linux kernel before
> 5.9-rc2 with the ext3/ext4 file system, in the way it accesses a
> directory with broken indexing. This flaw allows a local user to crash
> the system if the directory exists. The highest threat from this
> vulnerability is to system availability.
>
> Upstream cover-letter for patch from Eric Sandeen:
>
> "We recently had a report of a panic in do_split; the filesystem in
> question panicked a distribution kernel when trying to add a new
> directory entry; the behavior/bug persists upstream.
>
> The directory block in question had lots of unused and un-coalesced
> entries, like this, printed from the loop in ext4_insert_dentry():
>
> [32778.024654] reclen 44 for name len 36
> [32778.028745] start: de ffff9f4cb5309800 top ffff9f4cb5309bd4
> [32778.034971] offset 0 nlen 28 rlen 40, rlen-nlen 12, reclen 44 name <empty>
> [32778.042744] offset 40 nlen 28 rlen 28, rlen-nlen 0, reclen 44 name <empty>
> [32778.050521] offset 68 nlen 32 rlen 32, rlen-nlen 0, reclen 44 name <empty>
> [32778.058294] offset 100 nlen 28 rlen 28, rlen-nlen 0, reclen 44 name <empty>
> [32778.066166] offset 128 nlen 28 rlen 28, rlen-nlen 0, reclen 44 name <empty>
> [32778.074035] offset 156 nlen 28 rlen 28, rlen-nlen 0, reclen 44 name <empty>
> [32778.081907] offset 184 nlen 24 rlen 24, rlen-nlen 0, reclen 44 name <empty>
> [32778.089779] offset 208 nlen 36 rlen 36, rlen-nlen 0, reclen 44 name <empty>
> [32778.097648] offset 244 nlen 12 rlen 12, rlen-nlen 0, reclen 44 name REDACTED
> [32778.105227] offset 256 nlen 24 rlen 24, rlen-nlen 0, reclen 44 name <empty>
> [32778.113099] offset 280 nlen 24 rlen 24, rlen-nlen 0, reclen 44 name REDACTED
> [32778.122134] offset 304 nlen 20 rlen 20, rlen-nlen 0, reclen 44 name REDACTED
> [32778.130780] offset 324 nlen 16 rlen 16, rlen-nlen 0, reclen 44 name REDACTED
> [32778.138746] offset 340 nlen 24 rlen 24, rlen-nlen 0, reclen 44 name <empty>
> [32778.146616] offset 364 nlen 28 rlen 28, rlen-nlen 0, reclen 44 name <empty>
> [32778.154487] offset 392 nlen 24 rlen 24, rlen-nlen 0, reclen 44 name <empty>
> [32778.162362] offset 416 nlen 16 rlen 16, rlen-nlen 0, reclen 44 name <empty>
> ...
>
> the file we were trying to insert needed a record length of 44, and none
> of the non-coalesced <empty> slots were big enough, so we failed and
> told do_split to get to work.
>
> However, the sum of the non-empty entries didn't exceed half the block
> size, so the loop in do_split() iterated over all of the entries, ended
> at "count," and told us to split at (count - move) which is zero, and
> eventually:
>
> continued = hash2 == map[split - 1].hash;
>
> exploded on the negative index.
>
> It's an open question as to how this directory got into this format; I'm
> not sure if this should ever happen or not. But at a minimum, I think
> we should be defensive here, hence [PATCH 1/1] will do that as an
> expedient fix and backportable patch for this situation. There may be
> some other underlying probem which led to this directory structure if
> it's unexpected, and maybe that can come as another patch if anyone can
> investigate."
>
> [Fix]
>
> Apply following patch:
>
> 5872331b3d91 ("ext4: fix potential negative array index in do_split()")
>
> [Test Case]
>
> Example of when the failure hits is listed above. Reproducer was not
> provided and as mentioned above, it's unknown how the directory got into
> that format. Patch was submitted as a defensive measure to avoid
> risk of using a negative index.
>
> [Regression Potential]
>
> Minimal regression risk. Only risk seen is if the split blocks do not
> have adequate spacing after the split. However, if 'split = count/2' is
> ran, the number of active entries is less than half the size of the
> block. In this case, there should still be plenty of space (> half
> blocksize) in each split block.
>
> [Other]
>
> Already in Groovy, Focal, Bionic, Xenial
Clean upstream cherry-pick, very good coverage of the issue, looks good
to me, thanks!
Acked-by: Andrea Righi <andrea.righi at canonical.com>
More information about the kernel-team
mailing list