kernel-hacking-2024-linux-s.../fs/udf
Roman Smirnov 56e69e5975 udf: prevent integer overflow in udf_bitmap_free_blocks()
An overflow may occur if the function is called with the last
block and an offset greater than zero. It is necessary to add
a check to avoid this.

Found by Linux Verification Center (linuxtesting.org) with Svace.

[JK: Make test cover also unalloc table freeing]

Link: https://patch.msgid.link/20240620072413.7448-1-r.smirnov@omp.ru
Suggested-by: Jan Kara <jack@suse.com>
Signed-off-by: Roman Smirnov <r.smirnov@omp.ru>
Signed-off-by: Jan Kara <jack@suse.cz>
2024-06-26 12:54:11 +02:00
..
balloc.c udf: prevent integer overflow in udf_bitmap_free_blocks() 2024-06-26 12:54:11 +02:00
dir.c
directory.c
ecma_167.h
file.c udf: Fix lock ordering in udf_evict_inode() 2024-06-05 10:36:46 +02:00
ialloc.c
inode.c udf: Fix lock ordering in udf_evict_inode() 2024-06-05 10:36:46 +02:00
Kconfig
lowlevel.c
Makefile
misc.c
namei.c udf: Fix bogus checksum computation in udf_rename() 2024-06-20 15:07:27 +02:00
osta_udf.h
partition.c
super.c udf: Avoid excessive partition lengths 2024-06-26 12:54:11 +02:00
symlink.c udf: Convert udf_symlink_getattr() to use a folio 2024-04-23 15:37:02 +02:00
truncate.c
udf_i.h
udf_sb.h udf: convert novrs to an option flag 2024-02-21 13:55:30 +01:00
udfdecl.h
udfend.h
udftime.c udf: udftime: prevent overflow in udf_disk_stamp_to_time() 2024-04-10 13:10:12 +02:00
unicode.c