-

CVE-2022-50478

In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix shift-out-of-bounds/overflow in nilfs_sb2_bad_offset()

Patch series "nilfs2: fix UBSAN shift-out-of-bounds warnings on mount
time".

The first patch fixes a bug reported by syzbot, and the second one fixes
the remaining bug of the same kind.  Although they are triggered by the
same super block data anomaly, I divided it into the above two because the
details of the issues and how to fix it are different.

Both are required to eliminate the shift-out-of-bounds issues at mount
time.


This patch (of 2):

If the block size exponent information written in an on-disk superblock is
corrupted, nilfs_sb2_bad_offset helper function can trigger
shift-out-of-bounds warning followed by a kernel panic (if panic_on_warn
is set):

 shift exponent 38983 is too large for 64-bit type 'unsigned long long'
 Call Trace:
  <TASK>
  __dump_stack lib/dump_stack.c:88 [inline]
  dump_stack_lvl+0x1b1/0x28e lib/dump_stack.c:106
  ubsan_epilogue lib/ubsan.c:151 [inline]
  __ubsan_handle_shift_out_of_bounds+0x33d/0x3b0 lib/ubsan.c:322
  nilfs_sb2_bad_offset fs/nilfs2/the_nilfs.c:449 [inline]
  nilfs_load_super_block+0xdf5/0xe00 fs/nilfs2/the_nilfs.c:523
  init_nilfs+0xb7/0x7d0 fs/nilfs2/the_nilfs.c:577
  nilfs_fill_super+0xb1/0x5d0 fs/nilfs2/super.c:1047
  nilfs_mount+0x613/0x9b0 fs/nilfs2/super.c:1317
  ...

In addition, since nilfs_sb2_bad_offset() performs multiplication without
considering the upper bound, the computation may overflow if the disk
layout parameters are not normal.

This fixes these issues by inserting preliminary sanity checks for those
parameters and by converting the comparison from one involving
multiplication and left bit-shifting to one using division and right
bit-shifting.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 6b0ea3df56cccd53398d0289f399f19d43136b2e
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < a6f89b10042baca218c8598d6db5a44c7e32625f
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 9b3ba54025357440d6c4414c670984f628c6f6bf
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < d706485dffbbbf848e681edda29c7a46ac55698c
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < d464b035c0613856d012cf1704879d3ff3f057fb
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < b47f5c579c8186f7f5ab5e4254e0734ea5b7bf7a
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 1012ff77284e3bec0ec0a35a820b03ec43dec2cc
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 62d11ec205ef14d8acf172cfc9904fdbf200025a
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 610a2a3d7d8be3537458a378ec69396a76c385b6
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version <= 4.9.*
Version 4.9.337
Status unaffected
Version <= 4.14.*
Version 4.14.303
Status unaffected
Version <= 4.19.*
Version 4.19.270
Status unaffected
Version <= 5.4.*
Version 5.4.229
Status unaffected
Version <= 5.10.*
Version 5.10.163
Status unaffected
Version <= 5.15.*
Version 5.15.86
Status unaffected
Version <= 6.0.*
Version 6.0.16
Status unaffected
Version <= 6.1.*
Version 6.1.2
Status unaffected
Version <= *
Version 6.2
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.03% 0.084
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String