[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <1538542259-11868-1-git-send-email-wang6495@umn.edu>
Date: Tue, 2 Oct 2018 23:50:59 -0500
From: Wenwen Wang <wang6495@....edu>
To: Wenwen Wang <wang6495@....edu>
Cc: Kangjie Lu <kjlu@....edu>,
Alexander Shishkin <alexander.shishkin@...ux.intel.com>,
linux-kernel@...r.kernel.org (open list)
Subject: [PATCH] stm class: fix a missing-check bug
In stm_char_policy_set_ioctl(), the 'size' field of the struct
'stp_polic_id' is firstly copied from the user space and then checked,
because the length of the 'id' field in this struct, which represents an
identification string, is not fixed. If the 'size' field cannot pass the
check, an error code EINVAL will be returned. However, after the check, the
whole struct is copied again from the user space. Given that the user data
resides in the user space, a malicious user-space process can race to
change the size between the two copies. By doing so, the attacker can
bypass the check on the 'size' field and inject malicious data.
This patch removes the re-copying of the 'size' field in the second copy to
avoid the above issue.
Signed-off-by: Wenwen Wang <wang6495@....edu>
---
drivers/hwtracing/stm/core.c | 4 +++-
1 file changed, 3 insertions(+), 1 deletion(-)
diff --git a/drivers/hwtracing/stm/core.c b/drivers/hwtracing/stm/core.c
index 10bcb5d..7617fb4 100644
--- a/drivers/hwtracing/stm/core.c
+++ b/drivers/hwtracing/stm/core.c
@@ -570,11 +570,13 @@ static int stm_char_policy_set_ioctl(struct stm_file *stmf, void __user *arg)
if (!id)
return -ENOMEM;
- if (copy_from_user(id, arg, size)) {
+ if (copy_from_user(&id->master, (char __user *)arg + sizeof(size),
+ size - sizeof(size))) {
ret = -EFAULT;
goto err_free;
}
+ id->size = size;
if (id->__reserved_0 || id->__reserved_1)
goto err_free;
--
2.7.4
Powered by blists - more mailing lists