diff options
author | Chandan Rajendra <chandan@linux.ibm.com> | 2019-01-22 07:51:52 +0100 |
---|---|---|
committer | Al Viro <viro@zeniv.linux.org.uk> | 2019-02-01 07:57:33 +0100 |
commit | fbdb44013202305cd2aefb01df0a92bb55819702 (patch) | |
tree | d8e4924841ec469e9487eaac145eb8069efbe38b /fs/exec.c | |
parent | cgroup: saner refcounting for cgroup_root (diff) | |
download | linux-fbdb44013202305cd2aefb01df0a92bb55819702.tar.xz linux-fbdb44013202305cd2aefb01df0a92bb55819702.zip |
copy_mount_string: Limit string length to PATH_MAX
On ppc64le, When a string with PAGE_SIZE - 1 (i.e. 64k-1) length is
passed as a "filesystem type" argument to the mount(2) syscall,
copy_mount_string() ends up allocating 64k (the PAGE_SIZE on ppc64le)
worth of space for holding the string in kernel's address space.
Later, in set_precision() (invoked by get_fs_type() ->
__request_module() -> vsnprintf()), we end up assigning
strlen(fs-type-string) i.e. 65535 as the
value to 'struct printf_spec'->precision member. This field has a width
of 16 bits and it is a signed data type. Hence an invalid value ends
up getting assigned. This causes the "WARN_ONCE(spec->precision != prec,
"precision %d too large", prec)" statement inside set_precision() to be
executed.
This commit fixes the bug by limiting the length of the string passed by
copy_mount_string() to strndup_user() to PATH_MAX.
Signed-off-by: Chandan Rajendra <chandan@linux.ibm.com>
Reported-by: Abdul Haleem <abdhalee@linux.ibm.com>
Suggested-by: Al Viro <viro@zeniv.linux.org.uk>
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
Diffstat (limited to 'fs/exec.c')
0 files changed, 0 insertions, 0 deletions