linux/net/ceph
Ilya Dryomov c27a3e4d66 libceph: do not hard code max auth ticket len
We hard code cephx auth ticket buffer size to 256 bytes.  This isn't
enough for any moderate setups and, in case tickets themselves are not
encrypted, leads to buffer overflows (ceph_x_decrypt() errors out, but
ceph_decode_copy() doesn't - it's just a memcpy() wrapper).  Since the
buffer is allocated dynamically anyway, allocated it a bit later, at
the point where we know how much is going to be needed.

Fixes: http://tracker.ceph.com/issues/8979

Cc: stable@vger.kernel.org
Signed-off-by: Ilya Dryomov <ilya.dryomov@inktank.com>
Reviewed-by: Sage Weil <sage@redhat.com>
2014-09-10 20:08:36 +04:00
..
crush crush: add SET_CHOOSELEAF_VARY_R step 2014-04-04 21:07:28 -07:00
armor.c
auth_none.c
auth_none.h
auth_x_protocol.h
auth_x.c libceph: do not hard code max auth ticket len 2014-09-10 20:08:36 +04:00
auth_x.h
auth.c
buffer.c libceph: add ceph_kv{malloc,free}() and switch to them 2014-01-26 12:34:23 +02:00
ceph_common.c libceph: mon_get_version request infrastructure 2014-06-06 09:29:57 +08:00
ceph_fs.c
ceph_hash.c
ceph_strings.c
crypto.c KEYS: Ceph: Use user_match() 2014-07-22 21:46:30 +01:00
crypto.h
debugfs.c libceph: mon_get_version request infrastructure 2014-06-06 09:29:57 +08:00
Kconfig
Makefile
messenger.c libceph: set last_piece in ceph_msg_data_pages_cursor_init() correctly 2014-08-09 11:27:32 +04:00
mon_client.c libceph: gracefully handle large reply messages from the mon 2014-09-10 20:08:32 +04:00
msgpool.c
osd_client.c libceph: nuke ceph_osdc_unregister_linger_request() 2014-07-08 15:08:45 +04:00
osdmap.c crush: decode and initialize chooseleaf_vary_r 2014-05-16 21:29:55 +04:00
pagelist.c
pagevec.c ceph_sync_read: stop poking into iov_iter guts 2014-05-06 17:39:42 -04:00
snapshot.c