mirror of
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
synced 2025-01-01 10:45:49 +00:00
ab84eee4c7
Here is a BUG report from syzbot:
BUG: KASAN: slab-out-of-bounds in hdr_delete_de+0xe0/0x150 fs/ntfs3/index.c:806
Read of size 16842960 at addr ffff888079cc0600 by task syz-executor934/3631
Call Trace:
memmove+0x25/0x60 mm/kasan/shadow.c:54
hdr_delete_de+0xe0/0x150 fs/ntfs3/index.c:806
indx_delete_entry+0x74f/0x3670 fs/ntfs3/index.c:2193
ni_remove_name+0x27a/0x980 fs/ntfs3/frecord.c:2910
ntfs_unlink_inode+0x3d4/0x720 fs/ntfs3/inode.c:1712
ntfs_rename+0x41a/0xcb0 fs/ntfs3/namei.c:276
Before using the meta-data in struct INDEX_HDR, we need to
check index header valid or not. Otherwise, the corruptedi
(or malicious) fs image can cause out-of-bounds access which
could make kernel panic.
Fixes:
|
||
---|---|---|
.. | ||
lib | ||
attrib.c | ||
attrlist.c | ||
bitfunc.c | ||
bitmap.c | ||
debug.h | ||
dir.c | ||
file.c | ||
frecord.c | ||
fslog.c | ||
fsntfs.c | ||
index.c | ||
inode.c | ||
Kconfig | ||
lznt.c | ||
Makefile | ||
namei.c | ||
ntfs_fs.h | ||
ntfs.h | ||
record.c | ||
run.c | ||
super.c | ||
upcase.c | ||
xattr.c |