Skip to content

In the Linux kernel, the following vulnerability has been...

Unreviewed Published May 1, 2024 to the GitHub Advisory Database • Updated May 13, 2024

Package

No package listedSuggest a package

Affected versions

Unknown

Patched versions

Unknown

Description

In the Linux kernel, the following vulnerability has been resolved:

Squashfs: check the inode number is not the invalid value of zero

Syskiller has produced an out of bounds access in fill_meta_index().

That out of bounds access is ultimately caused because the inode
has an inode number with the invalid value of zero, which was not checked.

The reason this causes the out of bounds access is due to following
sequence of events:

  1. Fill_meta_index() is called to allocate (via empty_meta_index())
    and fill a metadata index. It however suffers a data read error
    and aborts, invalidating the newly returned empty metadata index.
    It does this by setting the inode number of the index to zero,
    which means unused (zero is not a valid inode number).

  2. When fill_meta_index() is subsequently called again on another
    read operation, locate_meta_index() returns the previous index
    because it matches the inode number of 0. Because this index
    has been returned it is expected to have been filled, and because
    it hasn't been, an out of bounds access is performed.

This patch adds a sanity check which checks that the inode number
is not zero when the inode is created and returns -EINVAL if it is.

[phillip@squashfs.org.uk: whitespace fix]
Link: https://lkml.kernel.org/r/20240409204723.446925-1-phillip@squashfs.org.uk

References

Published by the National Vulnerability Database May 1, 2024
Published to the GitHub Advisory Database May 1, 2024
Last updated May 13, 2024

Severity

Unknown

Weaknesses

No CWEs

CVE ID

CVE-2024-26982

GHSA ID

GHSA-8jh7-gcv4-cq6q

Source code

No known source code

Dependabot alerts are not supported on this advisory because it does not have a package from a supported ecosystem with an affected and fixed version.

Learn more about GitHub language support

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.