Skip to content

Commit

Permalink
isofs: fix access to unallocated memory when reading corrupted filesy…
Browse files Browse the repository at this point in the history
…stem

When a directory on isofs is corrupted, we did not check whether length of the
name in a directory entry and the length of the directory entry itself are
consistent.  This could lead to possible access beyond the end of buffer when
the length of the name was too big.  Add this sanity check to directory
reading code.

Signed-off-by: Jan Kara <[email protected]>
Signed-off-by: Andrew Morton <[email protected]>
Signed-off-by: Linus Torvalds <[email protected]>
  • Loading branch information
jankara authored and torvalds committed Apr 30, 2008
1 parent 6bfe0b4 commit 2deb1ac
Show file tree
Hide file tree
Showing 2 changed files with 15 additions and 0 deletions.
8 changes: 8 additions & 0 deletions fs/isofs/dir.c
Original file line number Diff line number Diff line change
Expand Up @@ -145,6 +145,14 @@ static int do_isofs_readdir(struct inode *inode, struct file *filp,
}
de = tmpde;
}
/* Basic sanity check, whether name doesn't exceed dir entry */
if (de_len < de->name_len[0] +
sizeof(struct iso_directory_record)) {
printk(KERN_NOTICE "iso9660: Corrupted directory entry"
" in block %lu of inode %lu\n", block,
inode->i_ino);
return -EIO;
}

if (first_de) {
isofs_normalize_block_and_offset(de,
Expand Down
7 changes: 7 additions & 0 deletions fs/isofs/namei.c
Original file line number Diff line number Diff line change
Expand Up @@ -111,6 +111,13 @@ isofs_find_entry(struct inode *dir, struct dentry *dentry,

dlen = de->name_len[0];
dpnt = de->name;
/* Basic sanity check, whether name doesn't exceed dir entry */
if (de_len < dlen + sizeof(struct iso_directory_record)) {
printk(KERN_NOTICE "iso9660: Corrupted directory entry"
" in block %lu of inode %lu\n", block,
dir->i_ino);
return 0;
}

if (sbi->s_rock &&
((i = get_rock_ridge_filename(de, tmpname, dir)))) {
Expand Down

0 comments on commit 2deb1ac

Please sign in to comment.