* [PATCH] fix integer overflow in groups_search
@ 2010-09-02 15:20 Jerome Marchand
2010-09-03 23:54 ` Andrew Morton
0 siblings, 1 reply; 2+ messages in thread
From: Jerome Marchand @ 2010-09-02 15:20 UTC (permalink / raw)
To: Linux Kernel Mailing List
gid_t is a unsigned int. If group_info contains a gid greater than
MAX_INT, groups_search() function may look on the wrong side of the
search tree.
This solves some unfair "permission denied" problems.
Signed-off-by: Jerome Marchand <jmarchan@redhat.com>
---
diff --git a/kernel/groups.c b/kernel/groups.c
index 53b1916..253dc0f 100644
--- a/kernel/groups.c
+++ b/kernel/groups.c
@@ -143,10 +143,9 @@ int groups_search(const struct group_info *group_info, gid_t grp)
right = group_info->ngroups;
while (left < right) {
unsigned int mid = (left+right)/2;
- int cmp = grp - GROUP_AT(group_info, mid);
- if (cmp > 0)
+ if (grp > GROUP_AT(group_info, mid))
left = mid + 1;
- else if (cmp < 0)
+ else if (grp < GROUP_AT(group_info, mid))
right = mid;
else
return 1;
^ permalink raw reply related [flat|nested] 2+ messages in thread* Re: [PATCH] fix integer overflow in groups_search
2010-09-02 15:20 [PATCH] fix integer overflow in groups_search Jerome Marchand
@ 2010-09-03 23:54 ` Andrew Morton
0 siblings, 0 replies; 2+ messages in thread
From: Andrew Morton @ 2010-09-03 23:54 UTC (permalink / raw)
To: Jerome Marchand; +Cc: Linux Kernel Mailing List
On Thu, 02 Sep 2010 17:20:20 +0200
Jerome Marchand <jmarchan@redhat.com> wrote:
>
> gid_t is a unsigned int. If group_info contains a gid greater than
> MAX_INT, groups_search() function may look on the wrong side of the
> search tree.
> This solves some unfair "permission denied" problems.
>
> Signed-off-by: Jerome Marchand <jmarchan@redhat.com>
> ---
> diff --git a/kernel/groups.c b/kernel/groups.c
> index 53b1916..253dc0f 100644
> --- a/kernel/groups.c
> +++ b/kernel/groups.c
> @@ -143,10 +143,9 @@ int groups_search(const struct group_info *group_info, gid_t grp)
> right = group_info->ngroups;
> while (left < right) {
> unsigned int mid = (left+right)/2;
> - int cmp = grp - GROUP_AT(group_info, mid);
> - if (cmp > 0)
> + if (grp > GROUP_AT(group_info, mid))
> left = mid + 1;
> - else if (cmp < 0)
> + else if (grp < GROUP_AT(group_info, mid))
> right = mid;
> else
> return 1;
hah, that's some pretty ancient code there. You must have a lot of
groups.
The patch is a no-brainer and I guess you've encountered the bug in
real kernels so I think we'll wave the fix at the -stable guys for
backporting, OK?
^ permalink raw reply [flat|nested] 2+ messages in thread
end of thread, other threads:[~2010-09-03 23:54 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2010-09-02 15:20 [PATCH] fix integer overflow in groups_search Jerome Marchand
2010-09-03 23:54 ` Andrew Morton
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox