]> git.ipfire.org Git - thirdparty/kernel/stable.git/commitdiff
ceph: validate snapdirname option length when mounting
authorIlya Dryomov <idryomov@gmail.com>
Wed, 20 Nov 2024 15:43:51 +0000 (16:43 +0100)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Fri, 27 Dec 2024 13:02:19 +0000 (14:02 +0100)
commit 12eb22a5a609421b380c3c6ca887474fb2089b2c upstream.

It becomes a path component, so it shouldn't exceed NAME_MAX
characters.  This was hardened in commit c152737be22b ("ceph: Use
strscpy() instead of strcpy() in __get_snap_name()"), but no actual
check was put in place.

Cc: stable@vger.kernel.org
Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
Reviewed-by: Alex Markuze <amarkuze@redhat.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
fs/ceph/super.c

index 86480e5a215e512bd159552b6592221e4885c63f..c235f9a60394c28ae77650fb282d4c4ba4ccd0a4 100644 (file)
@@ -431,6 +431,8 @@ static int ceph_parse_mount_param(struct fs_context *fc,
 
        switch (token) {
        case Opt_snapdirname:
+               if (strlen(param->string) > NAME_MAX)
+                       return invalfc(fc, "snapdirname too long");
                kfree(fsopt->snapdir_name);
                fsopt->snapdir_name = param->string;
                param->string = NULL;