]> www.infradead.org Git - linux.git/commitdiff
btrfs: fix use-after-free of block device file in __btrfs_free_extra_devids()
authorZhihao Cheng <chengzhihao1@huawei.com>
Mon, 21 Oct 2024 14:02:15 +0000 (22:02 +0800)
committerDavid Sterba <dsterba@suse.com>
Tue, 29 Oct 2024 20:59:25 +0000 (21:59 +0100)
Mounting btrfs from two images (which have the same one fsid and two
different dev_uuids) in certain executing order may trigger an UAF for
variable 'device->bdev_file' in __btrfs_free_extra_devids(). And
following are the details:

1. Attach image_1 to loop0, attach image_2 to loop1, and scan btrfs
   devices by ioctl(BTRFS_IOC_SCAN_DEV):

             /  btrfs_device_1 → loop0
   fs_device
             \  btrfs_device_2 → loop1
2. mount /dev/loop0 /mnt
   btrfs_open_devices
    btrfs_device_1->bdev_file = btrfs_get_bdev_and_sb(loop0)
    btrfs_device_2->bdev_file = btrfs_get_bdev_and_sb(loop1)
   btrfs_fill_super
    open_ctree
     fail: btrfs_close_devices // -ENOMEM
    btrfs_close_bdev(btrfs_device_1)
             fput(btrfs_device_1->bdev_file)
      // btrfs_device_1->bdev_file is freed
    btrfs_close_bdev(btrfs_device_2)
             fput(btrfs_device_2->bdev_file)

3. mount /dev/loop1 /mnt
   btrfs_open_devices
    btrfs_get_bdev_and_sb(&bdev_file)
     // EIO, btrfs_device_1->bdev_file is not assigned,
     // which points to a freed memory area
    btrfs_device_2->bdev_file = btrfs_get_bdev_and_sb(loop1)
   btrfs_fill_super
    open_ctree
     btrfs_free_extra_devids
      if (btrfs_device_1->bdev_file)
       fput(btrfs_device_1->bdev_file) // UAF !

Fix it by setting 'device->bdev_file' as 'NULL' after closing the
btrfs_device in btrfs_close_one_device().

Fixes: 142388194191 ("btrfs: do not background blkdev_put()")
CC: stable@vger.kernel.org # 4.19+
Link: https://bugzilla.kernel.org/show_bug.cgi?id=219408
Signed-off-by: Zhihao Cheng <chengzhihao1@huawei.com>
Reviewed-by: David Sterba <dsterba@suse.com>
Signed-off-by: David Sterba <dsterba@suse.com>
fs/btrfs/volumes.c

index 8f340ad1d938456df052c377b18f0dcbb85dbc49..eb51b609190fb54667b1162a86ec748401cb839f 100644 (file)
@@ -1105,6 +1105,7 @@ static void btrfs_close_one_device(struct btrfs_device *device)
        if (device->bdev) {
                fs_devices->open_devices--;
                device->bdev = NULL;
+               device->bdev_file = NULL;
        }
        clear_bit(BTRFS_DEV_STATE_WRITEABLE, &device->dev_state);
        btrfs_destroy_dev_zone_info(device);