android_kernel_google_msm/fs/udf
Jan Kara 664634f8a0 udf: Improve table length check to avoid possible overflow
commit 57b9655d01 upstream.

When a partition table length is corrupted to be close to 1 << 32, the
check for its length may overflow on 32-bit systems and we will think
the length is valid. Later on the kernel can crash trying to read beyond
end of buffer. Fix the check to avoid possible overflow.

Reported-by: Ben Hutchings <ben@decadent.org.uk>
Signed-off-by: Jan Kara <jack@suse.cz>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2012-08-09 08:31:36 -07:00
..
balloc.c udf: Fix handling of i_blocks 2012-02-29 21:53:47 +01:00
dir.c
directory.c
ecma_167.h
file.c udf: remove the second argument of k[un]map_atomic() 2012-03-20 21:48:26 +08:00
ialloc.c udf: Init/maintain file entry checkpoint field 2012-02-29 21:53:46 +01:00
inode.c udf: Fix file entry logicalBlocksRecorded 2012-02-29 21:53:47 +01:00
Kconfig
lowlevel.c
Makefile
misc.c
namei.c vfs: check i_nlink limits in vfs_{mkdir,rename_dir,link} 2012-03-20 21:29:32 -04:00
osta_udf.h
partition.c udf: Cleanup metadata flags handling 2011-10-31 23:49:48 +01:00
super.c udf: Improve table length check to avoid possible overflow 2012-08-09 08:31:36 -07:00
symlink.c udf: Treat symlink component of type 2 as / 2012-01-09 13:52:08 +01:00
truncate.c
udf_i.h udf: Init/maintain file entry checkpoint field 2012-02-29 21:53:46 +01:00
udf_sb.h udf: propagate umode_t 2012-01-03 22:55:08 -05:00
udfdecl.h udf: propagate umode_t 2012-01-03 22:55:08 -05:00
udfend.h
udftime.c
unicode.c