Details
-
Technical task
-
Resolution: Fixed
-
Blocker
-
Lustre 2.5.0
-
9435
Description
the code snippet is as follows:
/* We don't know the true size yet; copy the fixed-size part */ if (copy_from_user(hur, (void *)arg, sizeof(*hur))) { OBD_FREE_PTR(hur); RETURN(-EFAULT); } /* Compute the whole struct size */ totalsize = hur_len(hur); OBD_FREE_PTR(hur); OBD_ALLOC_LARGE(hur, totalsize); if (hur == NULL) RETURN(-ENOMEM);
So if the user space program passes in a malicious data with huge hur_len, the kernel will be in trouble. We need to make sure the itemcount is reasonable.
Attachments
Activity
Resolution | New: Fixed [ 1 ] | |
Status | Original: Open [ 1 ] | New: Resolved [ 5 ] |
Labels | Original: hsm | New: HSM |
Labels | New: hsm |
Affects Version/s | New: Lustre 2.5.0 [ 10295 ] |
Fix Version/s | New: Lustre 2.5.0 [ 10295 ] |
Priority | Original: Minor [ 4 ] | New: Blocker [ 1 ] |
Assignee | Original: WC Triage [ wc-triage ] | New: Jinshan Xiong [ jay ] |
Parent |
New:
|
|
Severity | Original: 3 [ 10022 ] | |
Issue Type | Original: Bug [ 1 ] | New: Technical task [ 7 ] |