The fix has been released on Xenial ESM (kernel version 4.4.0-224.257).
$ git log --oneline -1 341e4f5e9e07
341e4f5e9e07 UBUNTU: SAUCE: fuse: fix bad !inode in fuse_direntplus_link()
$ git describe --contains 341e4f5e9e07
Ubuntu-4.4.0-224.257~6
** Changed in: linux (Ubuntu Xenial)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1970482
Title:
Xenial: kernel BUG/Oops/crash in fuse_readdir() due to CVE-2020-36322
backport
Status in linux package in Ubuntu:
Invalid
Status in linux source package in Xenial:
Fix Released
Bug description:
[Impact]
* Users might hit kernel BUG/Oops/crash with fuse filesystems
on Xenial kernel 4.4.0-222.255 and later (backport from 4.9),
including the derivative/optimized kernels (linux-aws below).
* Introduced by the backport from 4.9 for CVE-2020-36322 [1]
[1] https://ubuntu.com/security/CVE-2020-36322
* Offending commit 8deb786162e1 ("fuse: fix bad inode")
linux-xenial$ git log --oneline origin/master-prep -- fs/fuse/dir.c | head
-n1
8deb786162e1 fuse: fix bad inode
linux-xenial$ git describe --contains 8deb786162e1
Ubuntu-4.4.0-222.255~6
[Fix]
* Check for non-NULL inode pointer before fuse_is_bad(inode)
in fuse_direntplus_link().
* (This is the only modified function/patch hunk which seems
to have issues; all others dereference 'inode' w/out check
at some point, even before this patch).
[Test Case]
* Not available at the moment.
[Regression Potential]
* Probably none, as this changes the hunk/code behavior to
what it was before the offending patch/backport w/ issue
was applied (where fuse_is_bad() wasn't called at all if
inode is NULL), and makes sense with the patch applied;
also, this same form is used in another hunk, where NULL
was checked.
[Example Stacktrace]
kernel: BUG: unable to handle kernel NULL pointer dereference at
00000000000002c0
kernel: IP: [<ffffffff8132ae16>] fuse_readdir+0x376/0x700
kernel: PGD 1e3e02c067 PUD 1c8b2aa067 PMD 0
kernel: Oops: 0000 [#5] SMP
kernel: Modules linked in: <...>
kernel: CPU: 1 PID: 12133 Comm: php-fpm Tainted: G D
4.4.0-1138-aws #152-Ubuntu
kernel: Hardware name: Amazon EC2 m5a.8xlarge/, BIOS 1.0 10/16/2017
kernel: task: ffff881bcf164600 ti: ffff881bcffec000 task.ti:
ffff881bcffec000
kernel: RIP: 0010:[<ffffffff8132ae16>] [<ffffffff8132ae16>]
fuse_readdir+0x376/0x700
kernel: RSP: 0018:ffff881bcffefe10 EFLAGS: 00010206
kernel: RAX: ffffc9000524bd00 RBX: 00000000000001a0 RCX:
0000000000000000
kernel: RDX: 0000000000000001 RSI: ffffc9000524bd00 RDI:
ffff881ed25bf3d8
kernel: RBP: ffff881bcffefea0 R08: 0000000000000000 R09:
0000000000000050
kernel: R10: ffff881b942a0c68 R11: ffff881ed25bf380 R12:
ffff881b942a0bd0
kernel: R13: ffff880f8ced0d80 R14: ffff881f25cb1800 R15:
ffff881ed25bf380
kernel: FS: 00007f884d100740(0000) GS:ffff880fb8c40000(0000)
knlGS:0000000000000000
kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
kernel: CR2: 00000000000002c0 CR3: 0000001cbc963000 CR4:
00000000003406f0
kernel: Stack:
kernel: ffff881bcffefef0 0000000000441d7f ffff880fb1c6a000
ffff881b942a0bf8
kernel: 0000000000000000 ffff881f25cb1800 ffffea006e50a800
ffff881b942a0ca0
kernel: 00000000ae046100 ffff880fae046100 000000361c41ec1e
ffff881b942a0c68
kernel: Call Trace:
kernel: [<ffffffff8122d018>] iterate_dir+0x98/0x120
kernel: [<ffffffff8112f0db>] ? __audit_syscall_entry+0xab/0xf0
kernel: [<ffffffff8122d589>] SyS_getdents+0x99/0x110
kernel: [<ffffffff8122d0a0>] ? iterate_dir+0x120/0x120
kernel: [<ffffffff81848f9b>] entry_SYSCALL_64_fastpath+0x22/0xd0
kernel: Code: 49 39 80 38 02 00 00 75 12 41 0f b7 00 41 33 44 24 64 f6
c4 f0 0f 84 72 02 00 00 4c 89 ff 4c 89 45 90 e8 ae 65 f0 ff 4c 8b 45 90 <49> 8b
80 c0 02 00 00 4c 89 ff a8 08 0f 85 67 02 00 00 e8 63 5c
kernel: RIP [<ffffffff8132ae16>] fuse_readdir+0x376/0x700
kernel: RSP <ffff881bcffefe10>
kernel: CR2: 00000000000002c0
kernel: ---[ end trace f89ac23b1e9bb24c ]---
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1970482/+subscriptions
--
Mailing list: https://launchpad.net/~kernel-packages
Post to : [email protected]
Unsubscribe : https://launchpad.net/~kernel-packages
More help : https://help.launchpad.net/ListHelp