lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2025090456-CVE-2025-38710-1b60@gregkh>
Date: Thu,  4 Sep 2025 17:33:15 +0200
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-cve-announce@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...nel.org>
Subject: CVE-2025-38710: gfs2: Validate i_depth for exhash directories

From: Greg Kroah-Hartman <gregkh@...nel.org>

Description
===========

In the Linux kernel, the following vulnerability has been resolved:

gfs2: Validate i_depth for exhash directories

A fuzzer test introduced corruption that ends up with a depth of 0 in
dir_e_read(), causing an undefined shift by 32 at:

  index = hash >> (32 - dip->i_depth);

As calculated in an open-coded way in dir_make_exhash(), the minimum
depth for an exhash directory is ilog2(sdp->sd_hash_ptrs) and 0 is
invalid as sdp->sd_hash_ptrs is fixed as sdp->bsize / 16 at mount time.

So we can avoid the undefined behaviour by checking for depth values
lower than the minimum in gfs2_dinode_in(). Values greater than the
maximum are already being checked for there.

Also switch the calculation in dir_make_exhash() to use ilog2() to
clarify how the depth is calculated.

Tested with the syzkaller repro.c and xfstests '-g quick'.

The Linux kernel CVE team has assigned CVE-2025-38710 to this issue.


Affected and fixed versions
===========================

	Fixed in 6.12.43 with commit 53a0249d68a210c16e961b83adfa82f94ee0a53d
	Fixed in 6.15.11 with commit b5f46951e62377b6e406fadc18bc3c5bdf1632a7
	Fixed in 6.16.2 with commit 9680c58675b82348ab84d387e4fa727f7587e1a0
	Fixed in 6.17-rc1 with commit 557c024ca7250bb65ae60f16c02074106c2f197b

Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.

Unaffected versions might change over time as fixes are backported to
older supported kernel versions.  The official CVE entry at
	https://cve.org/CVERecord/?id=CVE-2025-38710
will be updated if fixes are backported, please check that for the most
up to date information about this issue.


Affected files
==============

The file(s) affected by this issue are:
	fs/gfs2/dir.c
	fs/gfs2/glops.c


Mitigation
==========

The Linux kernel CVE team recommends that you update to the latest
stable kernel version for this, and many other bugfixes.  Individual
changes are never tested alone, but rather are part of a larger kernel
release.  Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all.  If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
	https://git.kernel.org/stable/c/53a0249d68a210c16e961b83adfa82f94ee0a53d
	https://git.kernel.org/stable/c/b5f46951e62377b6e406fadc18bc3c5bdf1632a7
	https://git.kernel.org/stable/c/9680c58675b82348ab84d387e4fa727f7587e1a0
	https://git.kernel.org/stable/c/557c024ca7250bb65ae60f16c02074106c2f197b

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ