Received: by 2002:ac0:a581:0:0:0:0:0 with SMTP id m1-v6csp2967646imm; Sun, 1 Jul 2018 09:20:55 -0700 (PDT) X-Google-Smtp-Source: AAOMgpc5bNk4n509gt6OQX5C+H9C8KikaJM53BlC3U2eAxEXsrXfh2VcRKUX4yXTBfe8uKjQ3Kpo X-Received: by 2002:a62:3481:: with SMTP id b123-v6mr22151518pfa.4.1530462055655; Sun, 01 Jul 2018 09:20:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1530462055; cv=none; d=google.com; s=arc-20160816; b=YW9xILg2jL1T52/gyYlL40lspBLFVa+hyv40t70E2fHbJNAhrp5RAUmNH+OK78amET li9IYqVZitRyD4ypprY5DcxtnnocRbgm9fOzTvim5lQnpG72KyEDpkwKh4tBjK98FlJ2 Q96RxeX+qSSDEDVWNGX8yFexueyfT8IhkwGYExMt5DaST2KkS6NvGopCSmw0QNM+WkKl Bl+1OpI9oGYOilnNa8szliDD3NH5iggXrBbGT1ukBmwfdQGc2XvBjD4ebNsxaUhZSynj yfX+e5J4h9LBVxIYLJrx3vHXi75dKu0wTcOK9lKXoXOWIT0synnsJ0KU2pxkhZjlZmcj HiBg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=lMU4do7fIg9ZdovUrKpBTgjD+q5h1/N6Nx1HErLDYac=; b=uJAgIvU/L52YnynIBmOoHUrn4S7PNjyyuKAeNxhyoKPSwkpK0Q38tCTxe2q5riNYLH 9mRZK2MrwVe0k0OhbSRmeKRCvwwG4Sh/KRB9FuzEWpIeAUoScJoJYqBaHF51NBhVUTJF vE6mv82rG0bKWEPHfdPiAxf1Mol6GjfcXCZnXbdywn4UL10kgMjQ3zOD/Wz3/AT0cdIg Rz2k6sqHkzWJYwdGp5BQrTjBHQYdICddh6T5BXVxgLziKHqLV2SQ+ENNCGruIxXTHAkh 32QPooosIcTxe3FakqZmsbKTQ9bO/LxrMbDGpkBzx2ksckbPFriM20WZCvgHM1RpskTn shiA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i62-v6si13657848pfc.255.2018.07.01.09.20.41; Sun, 01 Jul 2018 09:20:55 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933479AbeGAQTZ (ORCPT + 99 others); Sun, 1 Jul 2018 12:19:25 -0400 Received: from mail.linuxfoundation.org ([140.211.169.12]:33180 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753503AbeGAQTS (ORCPT ); Sun, 1 Jul 2018 12:19:18 -0400 Received: from localhost (LFbn-1-12247-202.w90-92.abo.wanadoo.fr [90.92.61.202]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id 2F75B86A; Sun, 1 Jul 2018 16:19:18 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Anatoly Trosinenko , Jan Kara Subject: [PATCH 4.4 095/105] udf: Detect incorrect directory size Date: Sun, 1 Jul 2018 18:02:45 +0200 Message-Id: <20180701153156.210980281@linuxfoundation.org> X-Mailer: git-send-email 2.18.0 In-Reply-To: <20180701153149.382300170@linuxfoundation.org> References: <20180701153149.382300170@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.4-stable review patch. If anyone has any objections, please let me know. ------------------ From: Jan Kara commit fa65653e575fbd958bdf5fb9c4a71a324e39510d upstream. Detect when a directory entry is (possibly partially) beyond directory size and return EIO in that case since it means the filesystem is corrupted. Otherwise directory operations can further corrupt the directory and possibly also oops the kernel. CC: Anatoly Trosinenko CC: stable@vger.kernel.org Reported-and-tested-by: Anatoly Trosinenko Signed-off-by: Jan Kara Signed-off-by: Greg Kroah-Hartman --- fs/udf/directory.c | 3 +++ 1 file changed, 3 insertions(+) --- a/fs/udf/directory.c +++ b/fs/udf/directory.c @@ -150,6 +150,9 @@ struct fileIdentDesc *udf_fileident_read sizeof(struct fileIdentDesc)); } } + /* Got last entry outside of dir size - fs is corrupted! */ + if (*nf_pos > dir->i_size) + return NULL; return fi; }