[PATCH v3] erofs: validate h_shared_count in erofs_init_inode_xattrs()
Utkal Singh
singhutkal015 at gmail.com
Wed Mar 18 03:41:35 AEDT 2026
A crafted image can set h_shared_count to a value much larger than
what xattr_isize allows. The loop in erofs_init_inode_xattrs() then
reads shared xattr IDs far beyond the inode's xattr region, causing
an out-of-bounds metadata read.
Add a sanity check ensuring:
h_shared_count <= (xattr_isize - sizeof(erofs_xattr_ibody_header)) / 4
Return -EFSCORRUPTED when the check fails.
Signed-off-by: Utkal Singh <singhutkal015 at gmail.com>
---
v3:
- use local variable sb instead of inode->i_sb in erofs_err()
to match existing code style in erofs_init_inode_xattrs()
- confirmed compile-tested with make fs/erofs/xattr.o
v2:
- initial patch with bounds check against xattr_isize
fs/erofs/xattr.c | 9 +++++++++
1 file changed, 9 insertions(+)
diff --git a/fs/erofs/xattr.c b/fs/erofs/xattr.c
index c411df5d9dfc..af16cf634a01 100644
--- a/fs/erofs/xattr.c
+++ b/fs/erofs/xattr.c
@@ -85,6 +85,15 @@ static int erofs_init_inode_xattrs(struct inode *inode)
}
vi->xattr_name_filter = le32_to_cpu(ih->h_name_filter);
vi->xattr_shared_count = ih->h_shared_count;
+ if (vi->xattr_shared_count >
+ (vi->xattr_isize - sizeof(struct erofs_xattr_ibody_header)) /
+ sizeof(__le32)) {
+ erofs_err(sb,
+ "bogus h_shared_count %u for nid %llu",
+ vi->xattr_shared_count, vi->nid);
+ ret = -EFSCORRUPTED;
+ goto out_unlock;
+ }
vi->xattr_shared_xattrs = kmalloc_objs(uint, vi->xattr_shared_count);
if (!vi->xattr_shared_xattrs) {
erofs_put_metabuf(&buf);
--
2.43.0
More information about the Linux-erofs
mailing list