In the Linux kernel, the following vulnerability has been resolved:
UBSAN: array-index-out-of-bounds in dtSplitRoot
Syzkaller reported the following issue:
oop0: detected capacity change from 0 to 32768
UBSAN: array-index-out-of-bounds in fs/jfs/jfsdtree.c:1971:9 index -2 is out of range for type 'struct dtslot [128]' CPU: 0 PID: 3613 Comm: syz-executor270 Not tainted 6.0.0-syzkaller-09423-g493ffd6605b2 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 Call Trace: <TASK> _dumpstack lib/dumpstack.c:88 [inline] dumpstacklvl+0x1b1/0x28e lib/dumpstack.c:106 ubsanepilogue lib/ubsan.c:151 [inline] _ubsanhandleoutofbounds+0xdb/0x130 lib/ubsan.c:283 dtSplitRoot+0x8d8/0x1900 fs/jfs/jfsdtree.c:1971 dtSplitUp fs/jfs/jfsdtree.c:985 [inline] dtInsert+0x1189/0x6b80 fs/jfs/jfsdtree.c:863 jfsmkdir+0x757/0xb00 fs/jfs/namei.c:270 vfsmkdir+0x3b3/0x590 fs/namei.c:4013 domkdirat+0x279/0x550 fs/namei.c:4038 _dosysmkdirat fs/namei.c:4053 [inline] _sesysmkdirat fs/namei.c:4051 [inline] _x64sysmkdirat+0x85/0x90 fs/namei.c:4051 dosyscallx64 arch/x86/entry/common.c:50 [inline] dosyscall64+0x3d/0xb0 arch/x86/entry/common.c:80 entrySYSCALL64afterhwframe+0x63/0xcd RIP: 0033:0x7fcdc0113fd9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ffeb8bc67d8 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fcdc0113fd9 RDX: 0000000000000000 RSI: 0000000020000340 RDI: 0000000000000003 RBP: 00007fcdc00d37a0 R08: 0000000000000000 R09: 00007fcdc00d37a0 R10: 00005555559a72c0 R11: 0000000000000246 R12: 00000000f8008000 R13: 0000000000000000 R14: 00083878000000f8 R15: 0000000000000000 </TASK>
The issue is caused when the value of fsi becomes less than -1. The check to break the loop when fsi value becomes -1 is present but syzbot was able to produce value less than -1 which cause the error. This patch simply add the change for the values less than 0.
The patch is tested via syzbot.
[
{
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e30b52a2ea3d1e0aaee68096957cf90a2f4ec5af",
"deprecated": false,
"signature_version": "v1",
"digest": {
"function_hash": "28193528434838136962266614414516774954",
"length": 3398.0
},
"id": "CVE-2023-52603-17584dc4",
"target": {
"function": "dtSplitRoot",
"file": "fs/jfs/jfs_dtree.c"
}
},
{
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7aa33854477d9c346f5560a1a1fcb3fe7783e2a8",
"deprecated": false,
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"201049847124156183533258384803732740457",
"14765141781479920404202904774243235580",
"310930751523627771677869656118515716868",
"328120501859459795446688821747187345577"
]
},
"id": "CVE-2023-52603-1b092e9b",
"target": {
"file": "fs/jfs/jfs_dtree.c"
}
},
{
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7aa33854477d9c346f5560a1a1fcb3fe7783e2a8",
"deprecated": false,
"signature_version": "v1",
"digest": {
"function_hash": "28193528434838136962266614414516774954",
"length": 3398.0
},
"id": "CVE-2023-52603-2740a9f5",
"target": {
"function": "dtSplitRoot",
"file": "fs/jfs/jfs_dtree.c"
}
},
{
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6e2902ecc77e9760a9fc447f56d598383e2372d2",
"deprecated": false,
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"201049847124156183533258384803732740457",
"14765141781479920404202904774243235580",
"310930751523627771677869656118515716868",
"328120501859459795446688821747187345577"
]
},
"id": "CVE-2023-52603-301b4fa3",
"target": {
"file": "fs/jfs/jfs_dtree.c"
}
},
{
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@27e56f59bab5ddafbcfe69ad7a4a6ea1279c1b16",
"deprecated": false,
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"201049847124156183533258384803732740457",
"14765141781479920404202904774243235580",
"310930751523627771677869656118515716868",
"328120501859459795446688821747187345577"
]
},
"id": "CVE-2023-52603-310b5413",
"target": {
"file": "fs/jfs/jfs_dtree.c"
}
},
{
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e4cbc857d75d4e22a1f75446e7480b1f305d8d60",
"deprecated": false,
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"201049847124156183533258384803732740457",
"14765141781479920404202904774243235580",
"310930751523627771677869656118515716868",
"328120501859459795446688821747187345577"
]
},
"id": "CVE-2023-52603-34dcc857",
"target": {
"file": "fs/jfs/jfs_dtree.c"
}
},
{
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e4ce01c25ccbea02a09a5291c21749b1fc358e39",
"deprecated": false,
"signature_version": "v1",
"digest": {
"function_hash": "28193528434838136962266614414516774954",
"length": 3398.0
},
"id": "CVE-2023-52603-5e16d0eb",
"target": {
"function": "dtSplitRoot",
"file": "fs/jfs/jfs_dtree.c"
}
},
{
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@edff092a59260bf0b0a2eba219cb3da6372c2f9f",
"deprecated": false,
"signature_version": "v1",
"digest": {
"function_hash": "28193528434838136962266614414516774954",
"length": 3398.0
},
"id": "CVE-2023-52603-5ee59cfe",
"target": {
"function": "dtSplitRoot",
"file": "fs/jfs/jfs_dtree.c"
}
},
{
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e30b52a2ea3d1e0aaee68096957cf90a2f4ec5af",
"deprecated": false,
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"201049847124156183533258384803732740457",
"14765141781479920404202904774243235580",
"310930751523627771677869656118515716868",
"328120501859459795446688821747187345577"
]
},
"id": "CVE-2023-52603-6dffb061",
"target": {
"file": "fs/jfs/jfs_dtree.c"
}
},
{
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@fd3486a893778770557649fe28afa5e463d4ed07",
"deprecated": false,
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"201049847124156183533258384803732740457",
"14765141781479920404202904774243235580",
"310930751523627771677869656118515716868",
"328120501859459795446688821747187345577"
]
},
"id": "CVE-2023-52603-7a43700c",
"target": {
"file": "fs/jfs/jfs_dtree.c"
}
},
{
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e4cbc857d75d4e22a1f75446e7480b1f305d8d60",
"deprecated": false,
"signature_version": "v1",
"digest": {
"function_hash": "28193528434838136962266614414516774954",
"length": 3398.0
},
"id": "CVE-2023-52603-8dff6acc",
"target": {
"function": "dtSplitRoot",
"file": "fs/jfs/jfs_dtree.c"
}
},
{
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e4ce01c25ccbea02a09a5291c21749b1fc358e39",
"deprecated": false,
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"201049847124156183533258384803732740457",
"14765141781479920404202904774243235580",
"310930751523627771677869656118515716868",
"328120501859459795446688821747187345577"
]
},
"id": "CVE-2023-52603-ade898b1",
"target": {
"file": "fs/jfs/jfs_dtree.c"
}
},
{
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@27e56f59bab5ddafbcfe69ad7a4a6ea1279c1b16",
"deprecated": false,
"signature_version": "v1",
"digest": {
"function_hash": "28193528434838136962266614414516774954",
"length": 3398.0
},
"id": "CVE-2023-52603-cdf0ecf4",
"target": {
"function": "dtSplitRoot",
"file": "fs/jfs/jfs_dtree.c"
}
},
{
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6e2902ecc77e9760a9fc447f56d598383e2372d2",
"deprecated": false,
"signature_version": "v1",
"digest": {
"function_hash": "28193528434838136962266614414516774954",
"length": 3398.0
},
"id": "CVE-2023-52603-df8cf337",
"target": {
"function": "dtSplitRoot",
"file": "fs/jfs/jfs_dtree.c"
}
},
{
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@fd3486a893778770557649fe28afa5e463d4ed07",
"deprecated": false,
"signature_version": "v1",
"digest": {
"function_hash": "28193528434838136962266614414516774954",
"length": 3398.0
},
"id": "CVE-2023-52603-e10ad7be",
"target": {
"function": "dtSplitRoot",
"file": "fs/jfs/jfs_dtree.c"
}
},
{
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@edff092a59260bf0b0a2eba219cb3da6372c2f9f",
"deprecated": false,
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"201049847124156183533258384803732740457",
"14765141781479920404202904774243235580",
"310930751523627771677869656118515716868",
"328120501859459795446688821747187345577"
]
},
"id": "CVE-2023-52603-f9fe83c3",
"target": {
"file": "fs/jfs/jfs_dtree.c"
}
}
]