Bug 2300297 (CVE-2024-41014) - CVE-2024-41014 kernel: xfs: add bounds checking to xlog_recover_process_data
Summary: CVE-2024-41014 kernel: xfs: add bounds checking to xlog_recover_process_data
Keywords:
Status: NEW
Alias: CVE-2024-41014
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2300530
Blocks:
TreeView+ depends on / blocked
 
Reported: 2024-07-29 07:20 UTC by OSIDB Bzimport
Modified: 2024-09-04 07:19 UTC (History)
4 users (show)

Fixed In Version: kernel 6.11-rc1
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2024:6297 0 None None None 2024-09-04 07:19:15 UTC

Description OSIDB Bzimport 2024-07-29 07:20:26 UTC
In the Linux kernel, the following vulnerability has been resolved:

xfs: add bounds checking to xlog_recover_process_data

There is a lack of verification of the space occupied by fixed members
of xlog_op_header in the xlog_recover_process_data.

We can create a crafted image to trigger an out of bounds read by
following these steps:
    1) Mount an image of xfs, and do some file operations to leave records
    2) Before umounting, copy the image for subsequent steps to simulate
       abnormal exit. Because umount will ensure that tail_blk and
       head_blk are the same, which will result in the inability to enter
       xlog_recover_process_data
    3) Write a tool to parse and modify the copied image in step 2
    4) Make the end of the xlog_op_header entries only 1 byte away from
       xlog_rec_header->h_size
    5) xlog_rec_header->h_num_logops++
    6) Modify xlog_rec_header->h_crc

Fix:
Add a check to make sure there is sufficient space to access fixed members
of xlog_op_header.

Comment 8 Mauro Matteo Cascella 2024-07-29 17:02:45 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 2300530]

Comment 130 errata-xmlrpc 2024-09-04 07:19:14 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.6 Telecommunications Update Service

Via RHSA-2024:6297 https://access.redhat.com/errata/RHSA-2024:6297


Note You need to log in before you can comment on or make changes to this bug.