projects
/
linux-2.6-microblaze.git
/ commitdiff
commit
grep
author
committer
pickaxe
?
search:
re
summary
|
shortlog
|
log
|
commit
| commitdiff |
tree
raw
|
patch
| inline |
side by side
(parent:
9ace475
)
libceph: prevent potential out-of-bounds reads in handle_auth_done()
author
ziming zhang
<ezrakiez@gmail.com>
Thu, 11 Dec 2025 08:52:58 +0000
(16:52 +0800)
committer
Ilya Dryomov
<idryomov@gmail.com>
Mon, 5 Jan 2026 12:28:25 +0000
(13:28 +0100)
Perform an explicit bounds check on payload_len to avoid a possible
out-of-bounds access in the callout.
[ idryomov: changelog ]
Cc: stable@vger.kernel.org
Signed-off-by: ziming zhang <ezrakiez@gmail.com>
Reviewed-by: Ilya Dryomov <idryomov@gmail.com>
Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
net/ceph/messenger_v2.c
patch
|
blob
|
history
diff --git
a/net/ceph/messenger_v2.c
b/net/ceph/messenger_v2.c
index
833e578
..
c9d50c0
100644
(file)
--- a/
net/ceph/messenger_v2.c
+++ b/
net/ceph/messenger_v2.c
@@
-2376,7
+2376,9
@@
static int process_auth_done(struct ceph_connection *con, void *p, void *end)
ceph_decode_64_safe(&p, end, global_id, bad);
ceph_decode_32_safe(&p, end, con->v2.con_mode, bad);
+
ceph_decode_32_safe(&p, end, payload_len, bad);
+ ceph_decode_need(&p, end, payload_len, bad);
dout("%s con %p global_id %llu con_mode %d payload_len %d\n",
__func__, con, global_id, con->v2.con_mode, payload_len);