In the Linux kernel, the following vulnerability has been resolved:
ext4: zero i_disksize when initializing the bootloader inode
If the boot loader inode has never been used before, the EXT4_IOC_SWAP_BOOT inode will initialize it, including setting the i_size to 0. However, if the "never before used" boot loader has a non-zero i_size, then i_disksize will be non-zero, and the inconsistency between i_size and i_disksize can trigger a kernel warning:
WARNING: CPU: 0 PID: 2580 at fs/ext4/file.c:319 CPU: 0 PID: 2580 Comm: bb Not tainted 6.3.0-rc1-00004-g703695902cfa RIP: 0010:ext4_file_write_iter+0xbc7/0xd10 Call Trace: vfs_write+0x3b1/0x5c0 ksys_write+0x77/0x160 __x64_sys_write+0x22/0x30 do_syscall_64+0x39/0x80
Reproducer:
Fix this by setting i_disksize as well as i_size to zero when initiaizing the boot loader inode.
| Software | From | Fixed in |
|---|---|---|
| linux / linux_kernel | - | 4.14.310 |
| linux / linux_kernel | 4.15 | 4.19.278 |
| linux / linux_kernel | 4.20 | 5.4.237 |
| linux / linux_kernel | 5.5 | 5.10.175 |
| linux / linux_kernel | 5.11 | 5.15.103 |
| linux / linux_kernel | 5.16 | 6.1.20 |
| linux / linux_kernel | 6.2 | 6.2.7 |
| linux / linux_kernel | 6.3-rc1 | 6.3-rc1.x |