 60e335b76e
			
		
	
	60e335b76e
	
	
	
		
			
			This fixes CVE-2022-1304: An out-of-bounds read/write vulnerability was found in e2fsprogs 1.46.5. This issue leads to a segmentation fault and possibly arbitrary code execution via a specially crafted filesystem. Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
		
			
				
	
	
		
			51 lines
		
	
	
		
			1.7 KiB
		
	
	
	
		
			Diff
		
	
	
	
	
	
			
		
		
	
	
			51 lines
		
	
	
		
			1.7 KiB
		
	
	
	
		
			Diff
		
	
	
	
	
	
| From ab51d587bb9b229b1fade1afd02e1574c1ba5c76 Mon Sep 17 00:00:00 2001
 | |
| From: Lukas Czerner <lczerner@redhat.com>
 | |
| Date: Thu, 21 Apr 2022 19:31:48 +0200
 | |
| Subject: libext2fs: add sanity check to extent manipulation
 | |
| 
 | |
| It is possible to have a corrupted extent tree in such a way that a leaf
 | |
| node contains zero extents in it. Currently if that happens and we try
 | |
| to traverse the tree we can end up accessing wrong data, or possibly
 | |
| even uninitialized memory. Make sure we don't do that.
 | |
| 
 | |
| Additionally make sure that we have a sane number of bytes passed to
 | |
| memmove() in ext2fs_extent_delete().
 | |
| 
 | |
| Note that e2fsck is currently unable to spot and fix such corruption in
 | |
| pass1.
 | |
| 
 | |
| Signed-off-by: Lukas Czerner <lczerner@redhat.com>
 | |
| Reported-by: Nils Bars <nils_bars@t-online.de>
 | |
| Addresses: https://bugzilla.redhat.com/show_bug.cgi?id=2068113
 | |
| Addresses: CVE-2022-1304
 | |
| Addresses-Debian-Bug: #1010263
 | |
| Signed-off-by: Theodore Ts'o <tytso@mit.edu>
 | |
| ---
 | |
|  lib/ext2fs/extent.c | 8 ++++++++
 | |
|  1 file changed, 8 insertions(+)
 | |
| 
 | |
| --- a/lib/ext2fs/extent.c
 | |
| +++ b/lib/ext2fs/extent.c
 | |
| @@ -495,6 +495,10 @@ retry:
 | |
|  			ext2fs_le16_to_cpu(eh->eh_entries);
 | |
|  		newpath->max_entries = ext2fs_le16_to_cpu(eh->eh_max);
 | |
|  
 | |
| +		/* Make sure there is at least one extent present */
 | |
| +		if (newpath->left <= 0)
 | |
| +			return EXT2_ET_EXTENT_NO_DOWN;
 | |
| +
 | |
|  		if (path->left > 0) {
 | |
|  			ix++;
 | |
|  			newpath->end_blk = ext2fs_le32_to_cpu(ix->ei_block);
 | |
| @@ -1630,6 +1634,10 @@ errcode_t ext2fs_extent_delete(ext2_exte
 | |
|  
 | |
|  	cp = path->curr;
 | |
|  
 | |
| +	/* Sanity check before memmove() */
 | |
| +	if (path->left < 0)
 | |
| +		return EXT2_ET_EXTENT_LEAF_BAD;
 | |
| +
 | |
|  	if (path->left) {
 | |
|  		memmove(cp, cp + sizeof(struct ext3_extent_idx),
 | |
|  			path->left * sizeof(struct ext3_extent_idx));
 |