lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2025050921-CVE-2025-37858-7d8d@gregkh>
Date: Fri,  9 May 2025 08:42:36 +0200
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-cve-announce@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...nel.org>
Subject: CVE-2025-37858: fs/jfs: Prevent integer overflow in AG size calculation

From: Greg Kroah-Hartman <gregkh@...nel.org>

Description
===========

In the Linux kernel, the following vulnerability has been resolved:

fs/jfs: Prevent integer overflow in AG size calculation

The JFS filesystem calculates allocation group (AG) size using 1 <<
l2agsize in dbExtendFS(). When l2agsize exceeds 31 (possible with >2TB
aggregates on 32-bit systems), this 32-bit shift operation causes undefined
behavior and improper AG sizing.

On 32-bit architectures:
- Left-shifting 1 by 32+ bits results in 0 due to integer overflow
- This creates invalid AG sizes (0 or garbage values) in
sbi->bmap->db_agsize
- Subsequent block allocations would reference invalid AG structures
- Could lead to:
  - Filesystem corruption during extend operations
  - Kernel crashes due to invalid memory accesses
  - Security vulnerabilities via malformed on-disk structures

Fix by casting to s64 before shifting:
bmp->db_agsize = (s64)1 << l2agsize;

This ensures 64-bit arithmetic even on 32-bit architectures. The cast
matches the data type of db_agsize (s64) and follows similar patterns in
JFS block calculation code.

Found by Linux Verification Center (linuxtesting.org) with SVACE.

The Linux kernel CVE team has assigned CVE-2025-37858 to this issue.


Affected and fixed versions
===========================

	Fixed in 5.4.293 with commit dd07a985e2ded47b6c7d69fc93c1fe02977c8454
	Fixed in 5.10.237 with commit 8bb29629a5e4090e1ef7199cb42db04a52802239
	Fixed in 5.15.181 with commit 3d8a45f87010a802aa214bf39702ca9d99cbf3ba
	Fixed in 6.1.135 with commit 55edbf5dbf60a8195c21e92124c4028939ae16b2
	Fixed in 6.6.88 with commit 7ccf3b35274512b60ecb614e0637e76bd6f2d829
	Fixed in 6.12.24 with commit c802a6a4009f585111f903e810b3be9c6d0da329
	Fixed in 6.13.12 with commit 211ed8f5e39e61f9e4d18edd64ce8005a67a1b2a
	Fixed in 6.14.3 with commit ec34cdf4f917cc6abd306cf091f8b8361fedac88
	Fixed in 6.15-rc1 with commit 7fcbf789629cdb9fbf4e2172ce31136cfed11e5e

Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.

Unaffected versions might change over time as fixes are backported to
older supported kernel versions.  The official CVE entry at
	https://cve.org/CVERecord/?id=CVE-2025-37858
will be updated if fixes are backported, please check that for the most
up to date information about this issue.


Affected files
==============

The file(s) affected by this issue are:
	fs/jfs/jfs_dmap.c


Mitigation
==========

The Linux kernel CVE team recommends that you update to the latest
stable kernel version for this, and many other bugfixes.  Individual
changes are never tested alone, but rather are part of a larger kernel
release.  Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all.  If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
	https://git.kernel.org/stable/c/dd07a985e2ded47b6c7d69fc93c1fe02977c8454
	https://git.kernel.org/stable/c/8bb29629a5e4090e1ef7199cb42db04a52802239
	https://git.kernel.org/stable/c/3d8a45f87010a802aa214bf39702ca9d99cbf3ba
	https://git.kernel.org/stable/c/55edbf5dbf60a8195c21e92124c4028939ae16b2
	https://git.kernel.org/stable/c/7ccf3b35274512b60ecb614e0637e76bd6f2d829
	https://git.kernel.org/stable/c/c802a6a4009f585111f903e810b3be9c6d0da329
	https://git.kernel.org/stable/c/211ed8f5e39e61f9e4d18edd64ce8005a67a1b2a
	https://git.kernel.org/stable/c/ec34cdf4f917cc6abd306cf091f8b8361fedac88
	https://git.kernel.org/stable/c/7fcbf789629cdb9fbf4e2172ce31136cfed11e5e

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ