[Dapper] [CVE-2011-1017] [PATCH 1/1] fs/partitions/ldm.c: fix oops caused by corrupted partition table, CVE-2011-1017
Stefan Bader
stefan.bader at canonical.com
Wed Apr 27 11:15:17 UTC 2011
On 04/26/2011 08:44 PM, Brad Figg wrote:
> From: Timo Warns <Warns at pre-sense.de>
>
> BugLink: http://bugs.launchpad.net/bugs/771382
>
> CVE-2011-1017
>
> The kernel automatically evaluates partition tables of storage devices.
> The code for evaluating LDM partitions (in fs/partitions/ldm.c) contains
> a bug that causes a kernel oops on certain corrupted LDM partitions.
> A kernel subsystem seems to crash, because, after the oops, the kernel no
> longer recognizes newly connected storage devices.
>
> The patch validates the value of vblk_size.
>
> [akpm at linux-foundation.org: coding-style fixes]
> Signed-off-by: Timo Warns <warns at pre-sense.de>
> Cc: Eugene Teo <eugeneteo at kernel.sg>
> Cc: Harvey Harrison <harvey.harrison at gmail.com>
> Cc: Richard Russon <rich at flatcap.org>
> Signed-off-by: Andrew Morton <akpm at linux-foundation.org>
> Signed-off-by: Linus Torvalds <torvalds at linux-foundation.org>
>
> (backported from commit c340b1d640001c8c9ecff74f68fd90422ae2448a)
> Signed-off-by: Brad Figg <brad.figg at canonical.com>
> ---
> fs/partitions/ldm.c | 16 ++++++++++++----
> 1 files changed, 12 insertions(+), 4 deletions(-)
>
> diff --git a/fs/partitions/ldm.c b/fs/partitions/ldm.c
> index 7ab1c11..c861f52 100644
> --- a/fs/partitions/ldm.c
> +++ b/fs/partitions/ldm.c
> @@ -1225,6 +1225,11 @@ static BOOL ldm_frag_add (const u8 *data, int size, struct list_head *frags)
>
> BUG_ON (!data || !frags);
>
> + if (size < 2 * VBLK_SIZE_HEAD) {
> + ldm_error("Value of size is to small.");
> + return FALSE;
> + }
> +
> group = BE32 (data + 0x08);
> rec = BE16 (data + 0x0C);
> num = BE16 (data + 0x0E);
> @@ -1232,6 +1237,10 @@ static BOOL ldm_frag_add (const u8 *data, int size, struct list_head *frags)
> ldm_error ("A VBLK claims to have %d parts.", num);
> return FALSE;
> }
> + if (rec >= num) {
> + ldm_error("REC value (%d) exceeds NUM value (%d)", rec, num);
> + return FALSE;
> + }
>
> list_for_each (item, frags) {
> f = list_entry (item, struct frag, list);
> @@ -1260,10 +1269,9 @@ found:
>
> f->map |= (1 << rec);
>
> - if (num > 0) {
> - data += VBLK_SIZE_HEAD;
> - size -= VBLK_SIZE_HEAD;
> - }
> + data += VBLK_SIZE_HEAD;
> + size -= VBLK_SIZE_HEAD;
> +
> memcpy (f->data+rec*(size-VBLK_SIZE_HEAD)+VBLK_SIZE_HEAD, data, size);
>
> return TRUE;
I believe some thread which cve-2011-1017 was pointing to on mitre, lead to this
patch claiming it would be the fix.
And this patch looks the same.
Acked-by: Stefan Bader <stefan.bader at canonical.com>
More information about the kernel-team
mailing list