block: do not pass disk names as format strings
authorKees Cook <keescook@chromium.org>
Wed, 3 Jul 2013 22:01:14 +0000 (15:01 -0700)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Sat, 13 Jul 2013 18:42:26 +0000 (11:42 -0700)
commit88ce7cf76ced99962699d0ebb4d47d6a88b94c29
treef55e59db7fc04ebca71354ab4a529fc682a4ec09
parent70621db0945635044214766b42e2dfca0d673929
block: do not pass disk names as format strings

commit ffc8b30866879ed9ba62bd0a86fecdbd51cd3d19 upstream.

Disk names may contain arbitrary strings, so they must not be
interpreted as format strings.  It seems that only md allows arbitrary
strings to be used for disk names, but this could allow for a local
memory corruption from uid 0 into ring 0.

CVE-2013-2851

Signed-off-by: Kees Cook <keescook@chromium.org>
Cc: Jens Axboe <axboe@kernel.dk>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
block/genhd.c
drivers/block/nbd.c
drivers/scsi/osd/osd_uld.c