We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-47736

erofs: handle overlapped pclusters out of crafted images properly



Description

In the Linux kernel, the following vulnerability has been resolved: erofs: handle overlapped pclusters out of crafted images properly syzbot reported a task hang issue due to a deadlock case where it is waiting for the folio lock of a cached folio that will be used for cache I/Os. After looking into the crafted fuzzed image, I found it's formed with several overlapped big pclusters as below: Ext: logical offset | length : physical offset | length 0: 0.. 16384 | 16384 : 151552.. 167936 | 16384 1: 16384.. 32768 | 16384 : 155648.. 172032 | 16384 2: 32768.. 49152 | 16384 : 537223168.. 537239552 | 16384 ... Here, extent 0/1 are physically overlapped although it's entirely _impossible_ for normal filesystem images generated by mkfs. First, managed folios containing compressed data will be marked as up-to-date and then unlocked immediately (unlike in-place folios) when compressed I/Os are complete. If physical blocks are not submitted in the incremental order, there should be separate BIOs to avoid dependency issues. However, the current code mis-arranges z_erofs_fill_bio_vec() and BIO submission which causes unexpected BIO waits. Second, managed folios will be connected to their own pclusters for efficient inter-queries. However, this is somewhat hard to implement easily if overlapped big pclusters exist. Again, these only appear in fuzzed images so let's simply fall back to temporary short-lived pages for correctness. Additionally, it justifies that referenced managed folios cannot be truncated for now and reverts part of commit 2080ca1ed3e4 ("erofs: tidy up `struct z_erofs_bvec`") for simplicity although it shouldn't be any difference.

Reserved 2024-09-30 | Published 2024-10-21 | Updated 2025-05-04 | Assigner Linux

Product status

Default status
unaffected

8e6c8fa9f2e95c88a642521a5da19a8e31748846 before 1bf7e414cac303c9aec1be67872e19be8b64980c
affected

8e6c8fa9f2e95c88a642521a5da19a8e31748846 before b9b30af0e86ffb485301ecd83b9129c9dfb7ebf8
affected

8e6c8fa9f2e95c88a642521a5da19a8e31748846 before 9cfa199bcbbbba31cbf97b2786f44f4464f3f29a
affected

8e6c8fa9f2e95c88a642521a5da19a8e31748846 before 9e2f9d34dd12e6e5b244ec488bcebd0c2d566c50
affected

Default status
affected

5.13
affected

Any version before 5.13
unaffected

6.6.72
unaffected

6.10.13
unaffected

6.11.2
unaffected

6.12
unaffected

References

git.kernel.org/...c/1bf7e414cac303c9aec1be67872e19be8b64980c

git.kernel.org/...c/b9b30af0e86ffb485301ecd83b9129c9dfb7ebf8

git.kernel.org/...c/9cfa199bcbbbba31cbf97b2786f44f4464f3f29a

git.kernel.org/...c/9e2f9d34dd12e6e5b244ec488bcebd0c2d566c50

cve.org (CVE-2024-47736)

nvd.nist.gov (CVE-2024-47736)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2024-47736

Support options

Helpdesk Chat, Email, Knowledgebase