From: Salva Peiró Date: Mon, 3 Mar 2014 07:44:04 +0000 (+0100) Subject: staging/cxt1e1/linux.c: Correct arbitrary memory write in c4_ioctl() X-Git-Tag: v3.14-rc6~4^2 X-Git-Url: http://review.tizen.org/git/?a=commitdiff_plain;h=084b6e7765b9554699afa23a50e702a3d0ae4b24;p=profile%2Fivi%2Fkernel-x86-ivi.git staging/cxt1e1/linux.c: Correct arbitrary memory write in c4_ioctl() The function c4_ioctl() writes data from user in ifr->ifr_data to the kernel struct data arg, without any iolen bounds checking. This can lead to a arbitrary write outside of the struct data arg. Corrected by adding bounds-checking of iolen before the copy_from_user(). Signed-off-by: Salva Peiró Signed-off-by: Greg Kroah-Hartman --- diff --git a/drivers/staging/cxt1e1/linux.c b/drivers/staging/cxt1e1/linux.c index 4a08e16..79206cb 100644 --- a/drivers/staging/cxt1e1/linux.c +++ b/drivers/staging/cxt1e1/linux.c @@ -866,6 +866,8 @@ c4_ioctl (struct net_device *ndev, struct ifreq *ifr, int cmd) _IOC_SIZE (iocmd)); #endif iolen = _IOC_SIZE (iocmd); + if (iolen > sizeof(arg)) + return -EFAULT; data = ifr->ifr_data + sizeof (iocmd); if (copy_from_user (&arg, data, iolen)) return -EFAULT;