The patch titled ecryptfs: Validate body size has been added to the -mm tree. Its filename is ecryptfs-validate-body-size.patch See http://www.zip.com.au/~akpm/linux/patches/stuff/added-to-mm.txt to find out what to do about this ------------------------------------------------------ Subject: ecryptfs: Validate body size From: Stephan Mueller <smueller@xxxxxxxxxx> The patch ensures that body_size is checked for improper values. Signed-off-by: Stephan Mueller <smueller@xxxxxxxxxx> Acked-by: Michael Halcrow <mhalcrow@xxxxxxxxxx> Signed-off-by: Andrew Morton <akpm@xxxxxxxx> --- fs/ecryptfs/keystore.c | 6 ++++++ 1 files changed, 6 insertions(+) diff -puN fs/ecryptfs/keystore.c~ecryptfs-validate-body-size fs/ecryptfs/keystore.c --- 25/fs/ecryptfs/keystore.c~ecryptfs-validate-body-size Tue Jun 27 15:09:33 2006 +++ 25-akpm/fs/ecryptfs/keystore.c Tue Jun 27 15:09:33 2006 @@ -397,6 +397,12 @@ parse_tag_11_packet(unsigned char *data, rc = -EINVAL; goto out; } + if (body_size < 13) { + ecryptfs_printk(KERN_WARNING, "Invalid body size ([%d])\n", + body_size); + rc = -EINVAL; + goto out; + } /* We have 13 bytes of surrounding packet values */ (*tag_11_contents_size) = (body_size - 13); if ((*tag_11_contents_size) > max_contents_bytes) { _ Patches currently in -mm which might be from smueller@xxxxxxxxxx are ecryptfs-validate-minimum-header-extent-size.patch ecryptfs-validate-body-size.patch ecryptfs-validate-packet-length-prior-to-parsing-add-comments.patch ecryptfs-validate-packet-length-prior-to-parsing-add-comments-fix.patch ecryptfs-use-the-passed-in-max-value-as-the-upper-bound.patch ecryptfs-change-the-maximum-size-check-when-writing-header.patch ecryptfs-print-the-actual-option-that-is-problematic.patch - To unsubscribe from this list: send the line "unsubscribe mm-commits" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html