lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <523095CB.6050302@lougher.demon.co.uk>
Date:	Wed, 11 Sep 2013 17:09:47 +0100
From:	Phillip Lougher <phillip@...gher.demon.co.uk>
To:	Linus Torvalds <torvalds@...ux-foundation.org>
CC:	Linux Kernel Development <linux-kernel@...r.kernel.org>
Subject: [GIT PULL] Squashfs updates for 3.12

Hi Linus,

Please pull the following Squashfs updates...

Thanks

Phillip


The following changes since commit d8dfad3876e4386666b759da3c833d62fb8b2267:

   Linux 3.11-rc7 (2013-08-25 17:43:22 -0700)

are available in the git repository at:

   git://git.kernel.org/pub/scm/linux/kernel/git/pkl/squashfs-next.git tags/squashfs-updates

for you to fetch changes up to 9e012423869e1efbae3762b87ceab509027231c9:

   Squashfs: add corruption check for type in squashfs_readdir() (2013-09-06 04:57:54 +0100)

----------------------------------------------------------------
A couple of minor additional sanity check patches for corrupted information,
and some fixes.  Apart from that there's a minor loop optimisation.

These sanity checks mainly exist to trap maliciously corrupted
filesystems either through using a deliberately modified mksquashfs,
or where the user has deliberately chosen to generate uncompressed
metadata and then corrupted it.

Normally metadata in Squashfs filesystems is compressed, which means
corruption (either accidental or malicious) is detected when
trying to decompress the metadata.  So corrupted data does not normally
get as far as the code paths in question here.

----------------------------------------------------------------
Dan Carpenter (1):
       Squashfs: sanity check information from disk

Manish Sharma (1):
       Squashfs: Optimized uncompressed buffer loop

Phillip Lougher (5):
       Squashfs: fix corruption check in get_dir_index_using_name()
       Squashfs: fix corruption checks in squashfs_lookup()
       Squashfs: fix corruption checks in squashfs_readdir()
       Squashfs: add corruption check in get_dir_index_using_offset()
       Squashfs: add corruption check for type in squashfs_readdir()

  fs/squashfs/block.c       |   11 ++++-------
  fs/squashfs/dir.c         |   17 +++++++++++++----
  fs/squashfs/namei.c       |    8 ++++++--
  fs/squashfs/squashfs_fs.h |    5 ++++-
  4 files changed, 27 insertions(+), 14 deletions(-)
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ