summaryrefslogtreecommitdiff
path: root/lib/dma-debug.c
diff options
context:
space:
mode:
authorBen Hutchings <ben@decadent.org.uk>2016-02-13 02:34:52 +0000
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>2016-06-07 17:21:58 -0700
commita952b0abde1c4502fd98fdba74859cb4ca6f4f78 (patch)
tree48feea42ee3b7fdc8a3c737c77e314bc7e5ffa46 /lib/dma-debug.c
parentb459bc762398544e7d27cd543b5e72850f1e65c1 (diff)
pipe: Fix buffer offset after partially failed read
commit feae3ca2e5e1a8f44aa6290255d3d9709985d0b2 upstream. Quoting the RHEL advisory: > It was found that the fix for CVE-2015-1805 incorrectly kept buffer > offset and buffer length in sync on a failed atomic read, potentially > resulting in a pipe buffer state corruption. A local, unprivileged user > could use this flaw to crash the system or leak kernel memory to user > space. (CVE-2016-0774, Moderate) The same flawed fix was applied to stable branches from 2.6.32.y to 3.14.y inclusive, and I was able to reproduce the issue on 3.2.y. We need to give pipe_iov_copy_to_user() a separate offset variable and only update the buffer offset if it succeeds. References: https://rhn.redhat.com/errata/RHSA-2016-0103.html Signed-off-by: Ben Hutchings <ben@decadent.org.uk> Cc: Willy Tarreau <w@1wt.eu> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'lib/dma-debug.c')
0 files changed, 0 insertions, 0 deletions