From: Helge Deller <deller@gmx.de>
To: Andrew Morton <akpm@linux-foundation.org>,
linux-parisc@vger.kernel.org, Kyle McMartin <kyle@mcmartin.ca>
Cc: Ilja <ilja@netric.org>,
security@kernel.org, Helge Deller <deller@gmx.de>,
"James E.J. Bottomley" <jejb@parisc-linux.org>
Subject: Re: [Security] [PATCH] bug in led_proc_write()
Date: Mon, 2 Aug 2010 22:46:41 +0200 [thread overview]
Message-ID: <20100802204641.GA2907@p100.box> (raw)
In-Reply-To: <20100710170458.96dc8a65.akpm@linux-foundation.org>
* Andrew Morton <akpm@linux-foundation.org>:
> On Sat, 10 Nov 2007 23:50:29 +0100 Ilja <ilja@netric.org> wrote:
> > When reading some of the parisc driver code I stumbled on a bug in
> > led_proc_write() in drivers/parisc/led.c
> > the code looks like:
> >
> > 182 static int led_proc_write(struct file *file, const char *buf,
> > 183 unsigned long count, void *data)
> > 184 {
> > 185 char *cur, lbuf[count + 1];
> > 186 int d;
> > 187
> > 188 if (!capable(CAP_SYS_ADMIN))
> > 189 return -EACCES;
> > ....
> > 235 }
> >
> > the problem being that the stack is limited and count is not (except for the
> > MAX_INT check done in sys_write() I guess). this could lead to stack
> > corruption (when for example calling capable()).
>
> yes, and the bug's still there. It allows a writer to /proc/pdc/led(?)
> to cause the kernel to consume an unbounded amount of stack.
Ilja, Andrew,
Thanks for the bug report.
Below is a patch to fix this issue.
Kyle, please apply to the parisc git tree.
Helge
-----------
[PARISC] led.c - fix potential stack overflow in led_proc_write()
avoid potential stack overflow by correctly checking count parameter
Signed-off-by: Helge Deller <deller@gmx.de>
diff --git a/drivers/parisc/led.c b/drivers/parisc/led.c
index 188bc84..d02be78 100644
--- a/drivers/parisc/led.c
+++ b/drivers/parisc/led.c
@@ -176,16 +176,18 @@ static ssize_t led_proc_write(struct file *file, const char *buf,
size_t count, loff_t *pos)
{
void *data = PDE(file->f_path.dentry->d_inode)->data;
- char *cur, lbuf[count + 1];
+ char *cur, lbuf[32];
int d;
if (!capable(CAP_SYS_ADMIN))
return -EACCES;
- memset(lbuf, 0, count + 1);
+ if (count >= sizeof(lbuf))
+ count = sizeof(lbuf)-1;
if (copy_from_user(lbuf, buf, count))
return -EFAULT;
+ lbuf[count] = 0;
cur = lbuf;
next parent reply other threads:[~2010-08-02 20:46 UTC|newest]
Thread overview: 2+ messages / expand[flat|nested] mbox.gz Atom feed top
[not found] <52a11dc3cc92b1e13c028304d9a7beaa@81.11.193.46>
[not found] ` <20100710170458.96dc8a65.akpm@linux-foundation.org>
2010-08-02 20:46 ` Helge Deller [this message]
2010-08-03 13:31 ` [Security] [PATCH] bug in led_proc_write() Kyle McMartin
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20100802204641.GA2907@p100.box \
--to=deller@gmx.de \
--cc=akpm@linux-foundation.org \
--cc=ilja@netric.org \
--cc=jejb@parisc-linux.org \
--cc=kyle@mcmartin.ca \
--cc=linux-parisc@vger.kernel.org \
--cc=security@kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.