Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp3225860imm; Fri, 20 Jul 2018 12:21:33 -0700 (PDT) X-Google-Smtp-Source: AAOMgpcAdxNFkWsxHdKeQCSpt7H1+LWaxRq4FhkyYJpiUFOZl0gY5ouer/pwXaHIJlYodmvMFJQC X-Received: by 2002:a65:45cc:: with SMTP id m12-v6mr3230079pgr.160.1532114493532; Fri, 20 Jul 2018 12:21:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1532114493; cv=none; d=google.com; s=arc-20160816; b=x328K5EdLk68KEB9XIAq1fB15/fYwmQd6ALGD9oF+0/8W4wz+JvAoJvk39NyyceXtw cKPIWnNRVopJS1zbR3CeIPOuxCGJwtkgZK8glR/Aoo7WM2LVL64lEP7He56HbdshOzWq EQECYYtNSU/0u5Sn7aAbL+KWNjxb7A1vAW0yGACv+grRk+liUuT+32a6ZS0MV408aM9T s2EuK4G6YZvBRkravRO3ejwlhIEsrWevTHOqr2UxqbVruLZMmMzypDgQBey5Jzvj9b8U 6ZLPXH1wDyP+4bc6HF2JBJWZyc88PkehrMSLKVxhNdEXppsTD455WAZ71ezRGnJwzRKR Fccg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :organization:references:in-reply-to:date:cc:to:from:subject :message-id:arc-authentication-results; bh=X9S03RuO3FoftM91fdnEasM0x1Moy7y4nHvX69an5Yo=; b=kTUeSH7UzuTVFdp7xA9F7qQq1SAkB6U7eMwZXjsullf1MqoJeaYbjJjOVwrPCFigvh 9tZjQzOpLbefXCO6+lcKs1y/gXQekr34PyME9JE8dCj+l8RibwMUYIYwpkwCH7wkwn4+ EMf0xfeX+2bKyLUCSk1wBu26WQrJE89CvncdveQBjZS4m7LlVJAHLJzAgXxIyfiSlHLs AgAz2PPhec5WOGhcnJtyTj1JGt2MtbLrvbS6YZzSdHUMUDTCaZzP/NpVCzKsZfqR/tcY P5n8u8GOKVhxPgUg2JSjQRcukLYg71AnY8G1WKlh/5k02jpP4dzeQN5Srz+Bpz+4On/7 CwMw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=codethink.co.uk Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k188-v6si2479379pgc.321.2018.07.20.12.21.18; Fri, 20 Jul 2018 12:21:33 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=codethink.co.uk Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388483AbeGTUJC (ORCPT + 99 others); Fri, 20 Jul 2018 16:09:02 -0400 Received: from imap1.codethink.co.uk ([176.9.8.82]:46323 "EHLO imap1.codethink.co.uk" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2388006AbeGTUJC (ORCPT ); Fri, 20 Jul 2018 16:09:02 -0400 Received: from [148.252.241.226] (helo=xylophone) by imap1.codethink.co.uk with esmtpsa (Exim 4.84_2 #1 (Debian)) id 1fgavx-0001an-Gt; Fri, 20 Jul 2018 20:19:21 +0100 Message-ID: <1532114359.21552.41.camel@codethink.co.uk> Subject: Re: [PATCH 4.4 095/105] udf: Detect incorrect directory size From: Ben Hutchings To: Anatoly Trosinenko , Jan Kara Cc: stable@vger.kernel.org, Greg Kroah-Hartman , linux-kernel@vger.kernel.org Date: Fri, 20 Jul 2018 20:19:19 +0100 In-Reply-To: <20180701153156.210980281@linuxfoundation.org> References: <20180701153149.382300170@linuxfoundation.org> <20180701153156.210980281@linuxfoundation.org> Organization: Codethink Ltd. Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.22.6-1+deb9u1 Mime-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sun, 2018-07-01 at 18:02 +0200, Greg Kroah-Hartman wrote: > 4.4-stable review patch.  If anyone has any objections, please let me know. > > ------------------ > > From: Jan Kara > > commit fa65653e575fbd958bdf5fb9c4a71a324e39510d upstream. > > Detect when a directory entry is (possibly partially) beyond directory > size and return EIO in that case since it means the filesystem is > corrupted. Otherwise directory operations can further corrupt the > directory and possibly also oops the kernel. [...] > --- a/fs/udf/directory.c > +++ b/fs/udf/directory.c > @@ -150,6 +150,9 @@ struct fileIdentDesc *udf_fileident_read >          sizeof(struct fileIdentDesc)); >   } >   } > + /* Got last entry outside of dir size - fs is corrupted! */ > + if (*nf_pos > dir->i_size) > + return NULL; >   return fi; >  } >   Is the same check needed when iinfo->i_alloc_type == ICBTAG_FLAG_AD_IN_ICB? Ben. -- Ben Hutchings, Software Developer   Codethink Ltd https://www.codethink.co.uk/ Dale House, 35 Dale Street Manchester, M1 2HF, United Kingdom