In the Linux kernel, the following vulnerability has been resolved:
jfs: fix array-index-out-of-bounds in diNewExt
[Syz report] UBSAN: array-index-out-of-bounds in fs/jfs/jfsimap.c:2360:2 index -878706688 is out of range for type 'struct iagctl[128]' CPU: 1 PID: 5065 Comm: syz-executor282 Not tainted 6.7.0-rc4-syzkaller-00009-gbee0e7762ad2 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 Call Trace: <TASK> _dumpstack lib/dumpstack.c:88 [inline] dumpstacklvl+0x1e7/0x2d0 lib/dumpstack.c:106 ubsanepilogue lib/ubsan.c:217 [inline] _ubsanhandleoutofbounds+0x11c/0x150 lib/ubsan.c:348 diNewExt+0x3cf3/0x4000 fs/jfs/jfsimap.c:2360 diAllocExt fs/jfs/jfsimap.c:1949 [inline] diAllocAG+0xbe8/0x1e50 fs/jfs/jfsimap.c:1666 diAlloc+0x1d3/0x1760 fs/jfs/jfsimap.c:1587 ialloc+0x8f/0x900 fs/jfs/jfsinode.c:56 jfsmkdir+0x1c5/0xb90 fs/jfs/namei.c:225 vfsmkdir+0x2f1/0x4b0 fs/namei.c:4106 domkdirat+0x264/0x3a0 fs/namei.c:4129 _dosysmkdir fs/namei.c:4149 [inline] _sesysmkdir fs/namei.c:4147 [inline] _x64sysmkdir+0x6e/0x80 fs/namei.c:4147 dosyscallx64 arch/x86/entry/common.c:51 [inline] dosyscall64+0x45/0x110 arch/x86/entry/common.c:82 entrySYSCALL64afterhwframe+0x63/0x6b RIP: 0033:0x7fcb7e6a0b57 Code: ff ff 77 07 31 c0 c3 0f 1f 40 00 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff c3 66 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ffd83023038 EFLAGS: 00000286 ORIG_RAX: 0000000000000053 RAX: ffffffffffffffda RBX: 00000000ffffffff RCX: 00007fcb7e6a0b57 RDX: 00000000000a1020 RSI: 00000000000001ff RDI: 0000000020000140 RBP: 0000000020000140 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000286 R12: 00007ffd830230d0 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[Analysis] When the agstart is too large, it can cause agno overflow.
[Fix] After obtaining agno, if the value is invalid, exit the subsequent process.
Modified the test from agno > MAXAG to agno >= MAXAG based on linux-next report by kernel test robot (Dan Carpenter).
{ "vanir_signatures": [ { "signature_version": "v1", "digest": { "threshold": 0.9, "line_hashes": [ "62886080360769719992505160751838762066", "87345940033270371107711773777436860809", "295423646057514764432644929967541588150", "279628800452747490349328118640193074274" ] }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5a6660139195f5e2fbbda459eeecb8788f3885fe", "deprecated": false, "target": { "file": "fs/jfs/jfs_imap.c" }, "signature_type": "Line", "id": "CVE-2023-52599-3083ee1d" }, { "signature_version": "v1", "digest": { "length": 4322.0, "function_hash": "179479853098360391879570583546931410434" }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e2b77d107b33bb31c8b1f5c4cb8f277b23728f1e", "deprecated": false, "target": { "file": "fs/jfs/jfs_imap.c", "function": "diNewExt" }, "signature_type": "Function", "id": "CVE-2023-52599-311a871a" }, { "signature_version": "v1", "digest": { "length": 4322.0, "function_hash": "179479853098360391879570583546931410434" }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3537f92cd22c672db97fae6997481e678ad14641", "deprecated": false, "target": { "file": "fs/jfs/jfs_imap.c", "function": "diNewExt" }, "signature_type": "Function", "id": "CVE-2023-52599-5f15bf67" }, { "signature_version": "v1", "digest": { "length": 4322.0, "function_hash": "179479853098360391879570583546931410434" }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5a6660139195f5e2fbbda459eeecb8788f3885fe", "deprecated": false, "target": { "file": "fs/jfs/jfs_imap.c", "function": "diNewExt" }, "signature_type": "Function", "id": "CVE-2023-52599-6a320d6f" }, { "signature_version": "v1", "digest": { "threshold": 0.9, "line_hashes": [ "62886080360769719992505160751838762066", "87345940033270371107711773777436860809", "295423646057514764432644929967541588150", "279628800452747490349328118640193074274" ] }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@de6a91aed1e0b1a23e9c11e7d7557f088eeeb017", "deprecated": false, "target": { "file": "fs/jfs/jfs_imap.c" }, "signature_type": "Line", "id": "CVE-2023-52599-6dae4f90" }, { "signature_version": "v1", "digest": { "threshold": 0.9, "line_hashes": [ "62886080360769719992505160751838762066", "87345940033270371107711773777436860809", "295423646057514764432644929967541588150", "279628800452747490349328118640193074274" ] }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3537f92cd22c672db97fae6997481e678ad14641", "deprecated": false, "target": { "file": "fs/jfs/jfs_imap.c" }, "signature_type": "Line", "id": "CVE-2023-52599-70d574f5" }, { "signature_version": "v1", "digest": { "length": 4322.0, "function_hash": "179479853098360391879570583546931410434" }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6996d43b14486f4a6655b10edc541ada1b580b4b", "deprecated": false, "target": { "file": "fs/jfs/jfs_imap.c", "function": "diNewExt" }, "signature_type": "Function", "id": "CVE-2023-52599-78ec09ae" }, { "signature_version": "v1", "digest": { "threshold": 0.9, "line_hashes": [ "62886080360769719992505160751838762066", "87345940033270371107711773777436860809", "295423646057514764432644929967541588150", "279628800452747490349328118640193074274" ] }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@49f9637aafa6e63ba686c13cb8549bf5e6920402", "deprecated": false, "target": { "file": "fs/jfs/jfs_imap.c" }, "signature_type": "Line", "id": "CVE-2023-52599-85bc8873" }, { "signature_version": "v1", "digest": { "length": 4322.0, "function_hash": "179479853098360391879570583546931410434" }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@49f9637aafa6e63ba686c13cb8549bf5e6920402", "deprecated": false, "target": { "file": "fs/jfs/jfs_imap.c", "function": "diNewExt" }, "signature_type": "Function", "id": "CVE-2023-52599-921e8a7b" }, { "signature_version": "v1", "digest": { "length": 4322.0, "function_hash": "179479853098360391879570583546931410434" }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6aa30020879042d46df9f747e4f0a486eea6fe98", "deprecated": false, "target": { "file": "fs/jfs/jfs_imap.c", "function": "diNewExt" }, "signature_type": "Function", "id": "CVE-2023-52599-949bb9d4" }, { "signature_version": "v1", "digest": { "threshold": 0.9, "line_hashes": [ "62886080360769719992505160751838762066", "87345940033270371107711773777436860809", "295423646057514764432644929967541588150", "279628800452747490349328118640193074274" ] }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e2b77d107b33bb31c8b1f5c4cb8f277b23728f1e", "deprecated": false, "target": { "file": "fs/jfs/jfs_imap.c" }, "signature_type": "Line", "id": "CVE-2023-52599-a44348f5" }, { "signature_version": "v1", "digest": { "threshold": 0.9, "line_hashes": [ "62886080360769719992505160751838762066", "87345940033270371107711773777436860809", "295423646057514764432644929967541588150", "279628800452747490349328118640193074274" ] }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6aa30020879042d46df9f747e4f0a486eea6fe98", "deprecated": false, "target": { "file": "fs/jfs/jfs_imap.c" }, "signature_type": "Line", "id": "CVE-2023-52599-c050cef2" }, { "signature_version": "v1", "digest": { "threshold": 0.9, "line_hashes": [ "62886080360769719992505160751838762066", "87345940033270371107711773777436860809", "295423646057514764432644929967541588150", "279628800452747490349328118640193074274" ] }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6996d43b14486f4a6655b10edc541ada1b580b4b", "deprecated": false, "target": { "file": "fs/jfs/jfs_imap.c" }, "signature_type": "Line", "id": "CVE-2023-52599-cc736739" }, { "signature_version": "v1", "digest": { "length": 4322.0, "function_hash": "179479853098360391879570583546931410434" }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@de6a91aed1e0b1a23e9c11e7d7557f088eeeb017", "deprecated": false, "target": { "file": "fs/jfs/jfs_imap.c", "function": "diNewExt" }, "signature_type": "Function", "id": "CVE-2023-52599-d3fbe40d" } ] }