]> git.proxmox.com Git - mirror_ubuntu-bionic-kernel.git/commit
dm ioctl: harden copy_params()'s copy_from_user() from malicious users
authorWenwen Wang <wang6495@umn.edu>
Wed, 3 Oct 2018 16:43:59 +0000 (11:43 -0500)
committerJuerg Haefliger <juergh@canonical.com>
Wed, 24 Jul 2019 01:57:34 +0000 (19:57 -0600)
commitb4f509a65cc041e85bddc38c815c8b741e56068f
tree88764c96786b47cf94b99c0543c0572cb8abdff7
parentb190669f5b0815ede199e4bfbf40c91636e8db77
dm ioctl: harden copy_params()'s copy_from_user() from malicious users

BugLink: https://bugs.launchpad.net/bugs/1836802
commit 800a7340ab7dd667edf95e74d8e4f23a17e87076 upstream.

In copy_params(), the struct 'dm_ioctl' is first copied from the user
space buffer 'user' to 'param_kernel' and the field 'data_size' is
checked against 'minimum_data_size' (size of 'struct dm_ioctl' payload
up to its 'data' member).  If the check fails, an error code EINVAL will be
returned.  Otherwise, param_kernel->data_size is used to do a second copy,
which copies from the same user-space buffer to 'dmi'.  After the second
copy, only 'dmi->data_size' is checked against 'param_kernel->data_size'.
Given that the buffer 'user' resides in the user space, a malicious
user-space process can race to change the content in the buffer between
the two copies.  This way, the attacker can inject inconsistent data
into 'dmi' (versus previously validated 'param_kernel').

Fix redundant copying of 'minimum_data_size' from user-space buffer by
using the first copy stored in 'param_kernel'.  Also remove the
'data_size' check after the second copy because it is now unnecessary.

Cc: stable@vger.kernel.org
Signed-off-by: Wenwen Wang <wang6495@umn.edu>
Signed-off-by: Mike Snitzer <snitzer@redhat.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Signed-off-by: Andrea Righi <andrea.righi@canonical.com>
Signed-off-by: Khalid Elmously <khalid.elmously@canonical.com>
drivers/md/dm-ioctl.c