Hi, Chen

On Mon, 20 Feb 2012 16:55:30 -0500, Haogang Chen wrote:
> ns_r_segments_percentage is read from the disk. Bogus or malicious
> value could cause integer overflow and potential security holes.
> This patch reports error when mounting such bogus volumes.
> 
> Signed-off-by: Haogang Chen <[email protected]>

Ok, I will pick this up as a fix.

But this seems not to cause security issues; it just makes some disk
usage calculations meaningless and causes malfunction for such
out-of-range values.  Right?

May I amend the change log in terms of the impact ?


Thanks,
Ryusuke Konishi

> ---
>  fs/nilfs2/the_nilfs.c |    6 ++++++
>  1 files changed, 6 insertions(+), 0 deletions(-)
> 
> diff --git a/fs/nilfs2/the_nilfs.c b/fs/nilfs2/the_nilfs.c
> index d327140..e12b47b 100644
> --- a/fs/nilfs2/the_nilfs.c
> +++ b/fs/nilfs2/the_nilfs.c
> @@ -409,6 +409,12 @@ static int nilfs_store_disk_layout(struct the_nilfs 
> *nilfs,
>       nilfs->ns_first_data_block = le64_to_cpu(sbp->s_first_data_block);
>       nilfs->ns_r_segments_percentage =
>               le32_to_cpu(sbp->s_r_segments_percentage);
> +     if (nilfs->ns_r_segments_percentage < 1 ||
> +             nilfs->ns_r_segments_percentage > 99) {
> +             printk(KERN_ERR "NILFS: invalid reserved segments 
> percentage.\n");
> +             return -EINVAL;
> +     }
> +
>       nilfs_set_nsegments(nilfs, le64_to_cpu(sbp->s_nsegments));
>       nilfs->ns_crc_seed = le32_to_cpu(sbp->s_crc_seed);
>       return 0;
> -- 
> 1.7.5.4
> 
> --
> To unsubscribe from this list: send the line "unsubscribe linux-nilfs" in
> the body of a message to [email protected]
> More majordomo info at  http://vger.kernel.org/majordomo-info.html
--
To unsubscribe from this list: send the line "unsubscribe linux-nilfs" in
the body of a message to [email protected]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to