summaryrefslogtreecommitdiffstats
path: root/fs/btrfs/super.c
diff options
context:
space:
mode:
authorFilipe Manana <fdmanana@suse.com>2018-11-14 11:35:24 +0000
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>2018-12-05 19:41:23 +0100
commit52fa8eaac8149594d57bd4fe0cfeaa329037d400 (patch)
tree6e38e765a778e97118a1fb1d8ce377fc8d884ef5 /fs/btrfs/super.c
parentd36e4ee3b3ce4cf93e8fa145841287bbdb140fec (diff)
downloadlinux-stable-52fa8eaac8149594d57bd4fe0cfeaa329037d400.tar.gz
linux-stable-52fa8eaac8149594d57bd4fe0cfeaa329037d400.tar.bz2
linux-stable-52fa8eaac8149594d57bd4fe0cfeaa329037d400.zip
Btrfs: ensure path name is null terminated at btrfs_control_ioctl
commit f505754fd6599230371cb01b9332754ddc104be1 upstream. We were using the path name received from user space without checking that it is null terminated. While btrfs-progs is well behaved and does proper validation and null termination, someone could call the ioctl and pass a non-null terminated patch, leading to buffer overrun problems in the kernel. The ioctl is protected by CAP_SYS_ADMIN. So just set the last byte of the path to a null character, similar to what we do in other ioctls (add/remove/resize device, snapshot creation, etc). CC: stable@vger.kernel.org # 4.4+ Reviewed-by: Anand Jain <anand.jain@oracle.com> Signed-off-by: Filipe Manana <fdmanana@suse.com> Reviewed-by: David Sterba <dsterba@suse.com> Signed-off-by: David Sterba <dsterba@suse.com> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'fs/btrfs/super.c')
-rw-r--r--fs/btrfs/super.c1
1 files changed, 1 insertions, 0 deletions
diff --git a/fs/btrfs/super.c b/fs/btrfs/super.c
index fe960d5e8913..49a02bf091ae 100644
--- a/fs/btrfs/super.c
+++ b/fs/btrfs/super.c
@@ -2176,6 +2176,7 @@ static long btrfs_control_ioctl(struct file *file, unsigned int cmd,
vol = memdup_user((void __user *)arg, sizeof(*vol));
if (IS_ERR(vol))
return PTR_ERR(vol);
+ vol->name[BTRFS_PATH_NAME_MAX] = '\0';
switch (cmd) {
case BTRFS_IOC_SCAN_DEV: