]> git.proxmox.com Git - mirror_ubuntu-zesty-kernel.git/commit
fs/xattr.c: zero out memory copied to userspace in getxattr
authorMichal Hocko <mhocko@suse.com>
Mon, 8 May 2017 22:57:24 +0000 (15:57 -0700)
committerStefan Bader <stefan.bader@canonical.com>
Tue, 20 Jun 2017 08:50:37 +0000 (10:50 +0200)
commitf2e74374dd49b5e0077b40f23904d1e5e62875ce
tree106611d5a97ff1d0c3045a255048289d7729b0cd
parentba1ea52db0e68f423d75f867e80652222c3bc463
fs/xattr.c: zero out memory copied to userspace in getxattr

BugLink: http://bugs.launchpad.net/bugs/1692898
commit 81be3dee96346fbe08c31be5ef74f03f6b63cf68 upstream.

getxattr uses vmalloc to allocate memory if kzalloc fails.  This is
filled by vfs_getxattr and then copied to the userspace.  vmalloc,
however, doesn't zero out the memory so if the specific implementation
of the xattr handler is sloppy we can theoretically expose a kernel
memory.  There is no real sign this is really the case but let's make
sure this will not happen and use vzalloc instead.

Fixes: 779302e67835 ("fs/xattr.c:getxattr(): improve handling of allocation failures")
Link: http://lkml.kernel.org/r/20170306103327.2766-1-mhocko@kernel.org
Acked-by: Kees Cook <keescook@chromium.org>
Reported-by: Vlastimil Babka <vbabka@suse.cz>
Signed-off-by: Michal Hocko <mhocko@suse.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Signed-off-by: Stefan Bader <stefan.bader@canonical.com>
Signed-off-by: Kleber Sacilotto de Souza <kleber.souza@canonical.com>
fs/xattr.c