Skip to content

Commit d18a3b5

Browse files
committed
erofs: fix the out-of-bounds nameoff handling for trailing dirents
Currently we already have boundary-checks for nameoffs, but the trailing dirents are special since the namelens are calculated with strnlen() with unchecked nameoffs. If a crafted EROFS has a trailing dirent with nameoff >= maxsize, maxsize - nameoff can underflow, causing strnlen() to read past the directory block. nameoff0 should also be verified to be a multiple of `sizeof(struct erofs_dirent)` as well [1]. [1] https://sashiko.dev/#/patchset/20260416063511.3173774-1-hsiangkao%40linux.alibaba.com Fixes: 3aa8ec7 ("staging: erofs: add directory operations") Fixes: 33bac91 ("staging: erofs: keep corrupted fs from crashing kernel in erofs_readdir()") Reported-by: Yuhao Jiang <danisjiang@gmail.com> Reported-by: Junrui Luo <moonafterrain@outlook.com> Closes: https://lore.kernel.org/r/A0FD7E0F-7558-49B0-8BC8-EB1ECDB2479A@outlook.com Cc: stable@vger.kernel.org Signed-off-by: Gao Xiang <hsiangkao@linux.alibaba.com> Reviewed-by: Chao Yu <chao@kernel.org>
1 parent a5242d3 commit d18a3b5

1 file changed

Lines changed: 15 additions & 13 deletions

File tree

fs/erofs/dir.c

Lines changed: 15 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -19,20 +19,18 @@ static int erofs_fill_dentries(struct inode *dir, struct dir_context *ctx,
1919
const char *de_name = (char *)dentry_blk + nameoff;
2020
unsigned int de_namelen;
2121

22-
/* the last dirent in the block? */
23-
if (de + 1 >= end)
24-
de_namelen = strnlen(de_name, maxsize - nameoff);
25-
else
22+
/* non-trailing dirent in the directory block? */
23+
if (de + 1 < end)
2624
de_namelen = le16_to_cpu(de[1].nameoff) - nameoff;
25+
else if (maxsize <= nameoff)
26+
goto err_bogus;
27+
else
28+
de_namelen = strnlen(de_name, maxsize - nameoff);
2729

28-
/* a corrupted entry is found */
29-
if (nameoff + de_namelen > maxsize ||
30-
de_namelen > EROFS_NAME_LEN) {
31-
erofs_err(dir->i_sb, "bogus dirent @ nid %llu",
32-
EROFS_I(dir)->nid);
33-
DBG_BUGON(1);
34-
return -EFSCORRUPTED;
35-
}
30+
/* a corrupted entry is found (including negative namelen) */
31+
if (!in_range32(de_namelen, 1, EROFS_NAME_LEN) ||
32+
nameoff + de_namelen > maxsize)
33+
goto err_bogus;
3634

3735
if (!dir_emit(ctx, de_name, de_namelen,
3836
erofs_nid_to_ino64(EROFS_SB(dir->i_sb),
@@ -42,6 +40,10 @@ static int erofs_fill_dentries(struct inode *dir, struct dir_context *ctx,
4240
ctx->pos += sizeof(struct erofs_dirent);
4341
}
4442
return 0;
43+
err_bogus:
44+
erofs_err(dir->i_sb, "bogus dirent @ nid %llu", EROFS_I(dir)->nid);
45+
DBG_BUGON(1);
46+
return -EFSCORRUPTED;
4547
}
4648

4749
static int erofs_readdir(struct file *f, struct dir_context *ctx)
@@ -88,7 +90,7 @@ static int erofs_readdir(struct file *f, struct dir_context *ctx)
8890
}
8991

9092
nameoff = le16_to_cpu(de->nameoff);
91-
if (nameoff < sizeof(struct erofs_dirent) || nameoff >= bsz) {
93+
if (!nameoff || nameoff >= bsz || (nameoff % sizeof(*de))) {
9294
erofs_err(sb, "invalid de[0].nameoff %u @ nid %llu",
9395
nameoff, EROFS_I(dir)->nid);
9496
err = -EFSCORRUPTED;

0 commit comments

Comments
 (0)