]> git-server-git.apps.pok.os.sepia.ceph.com Git - ceph-client.git/commitdiff
libceph: Fix potential null-ptr-deref in decode_choose_args() for-linus ceph-for-7.1-rc4
authorRaphael Zimmer <raphael.zimmer@tu-ilmenau.de>
Tue, 12 May 2026 16:16:40 +0000 (18:16 +0200)
committerIlya Dryomov <idryomov@gmail.com>
Tue, 12 May 2026 19:00:59 +0000 (21:00 +0200)
A message of type CEPH_MSG_OSD_MAP contains an OSD map that itself
contains a CRUSH map. When decoding this CRUSH map in crush_decode(), an
array of max_buckets CRUSH buckets is decoded, where some indices may
not refer to actual buckets and are therefore set to NULL. The received
CRUSH map may optionally contain choose_args that get decoded in
decode_choose_args(). When decoding a crush_choose_arg_map, a series of
choose_args for different buckets is decoded, with the bucket_index
being read from the incoming message. It is only checked that the bucket
index does not exceed max_buckets, but not that it doesn't point to an
index with a NULL bucket. If a (potentially corrupted) message contains
a crush_choose_arg_map including such a bucket_index, a null pointer
dereference may occur in the subsequent processing when attempting to
access the bucket with the given index.

This patch fixes the issue by extending the affected check. Now, it is
only attempted to access the bucket if it is not NULL.

Cc: stable@vger.kernel.org
Signed-off-by: Raphael Zimmer <raphael.zimmer@tu-ilmenau.de>
Reviewed-by: Ilya Dryomov <idryomov@gmail.com>
Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
net/ceph/osdmap.c

index 0752a3808b91aa135f91be8e1b1fe68005aa4720..8b5b0587a0cfa2c437b76c8c87251199efe20291 100644 (file)
@@ -388,7 +388,8 @@ static int decode_choose_args(void **p, void *end, struct crush_map *c)
                                goto fail;
 
                        if (arg->ids_size &&
-                           arg->ids_size != c->buckets[bucket_index]->size)
+                           (!c->buckets[bucket_index] ||
+                            arg->ids_size != c->buckets[bucket_index]->size))
                                goto e_inval;
                }