Re: [patch 07/21] fs: fix overflow in sys_mount() for in-kernel calls

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Fri, Sep 18, 2009 at 01:05:45PM -0700, akpm@xxxxxxxxxxxxxxxxxxxx wrote:
> From: Vegard Nossum <vegard.nossum@xxxxxxxxx>
> 
> On 2009/6/17 Ingo Molnar <mingo@xxxxxxx> reported:
> >
> > btw., here's an old friend of a warning:
> >

[snip]

> @@ -1640,7 +1640,7 @@ static int do_new_mount(struct path *pat
>  {
>  	struct vfsmount *mnt;
>  
> -	if (!type || !memchr(type, 0, PAGE_SIZE))
> +	if (!type)
>  		return -EINVAL;
>  
>  	/* we need capabilities... */
> @@ -1871,6 +1871,23 @@ int copy_mount_options(const void __user
>  	return 0;
>  }

> @@ -1900,8 +1917,6 @@ long do_mount(char *dev_name, char *dir_
>  
>  	if (!dir_name || !*dir_name || !memchr(dir_name, 0, PAGE_SIZE))
>  		return -EINVAL;
> -	if (dev_name && !memchr(dev_name, 0, PAGE_SIZE))
> -		return -EINVAL;
>  
>  	if (data_page)
>  		((char *)data_page)[PAGE_SIZE - 1] = 0;

In this form it's simply b0rken - you need to take care of other do_mount()
callers.  arch/alpha/kernel/osf_sys.c is safe, but fs/compat.c isn't...
--
To unsubscribe from this list: send the line "unsubscribe linux-fsdevel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html

[Index of Archives]     [Linux Ext4 Filesystem]     [Union Filesystem]     [Filesystem Testing]     [Ceph Users]     [Ecryptfs]     [AutoFS]     [Kernel Newbies]     [Share Photos]     [Security]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux Cachefs]     [Reiser Filesystem]     [Linux RAID]     [Samba]     [Device Mapper]     [CEPH Development]
  Powered by Linux