Lucene search

K
prionPRIOn knowledge basePRION:CVE-2023-52444
HistoryFeb 22, 2024 - 5:15 p.m.

Spoofing

2024-02-2217:15:00
PRIOn knowledge base
www.prio-n.com
4
linux kernel
f2fs vulnerability
f2fs_rename
cross-directory
dirent corruption
vulnerability resolution
inumber
link corruption

7.1 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

5.1%

In the Linux kernel, the following vulnerability has been resolved:

f2fs: fix to avoid dirent corruption

As Al reported in link[1]:

f2fs_rename()

if (old_dir != new_dir && !whiteout)
f2fs_set_link(old_inode, old_dir_entry,
old_dir_page, new_dir);
else
f2fs_put_page(old_dir_page, 0);

You want correct inumber in the “…” link. And cross-directory
rename does move the source to new parent, even if you’d been asked
to leave a whiteout in the old place.

[1] https://lore.kernel.org/all/20231017055040.GN800259@ZenIV/

With below testcase, it may cause dirent corruption, due to it missed
to call f2fs_set_link() to update “…” link to new directory.

  • mkdir -p dir/foo
  • renameat2 -w dir/foo bar

[ASSERT] (__chk_dots_dentries:1421) –> Bad inode number[0x4] for ‘…’, parent parent ino is [0x3]
[FSCK] other corrupted bugs [Fail]

7.1 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

5.1%