For the most of standard WE GET ioctls the size of the buffer to store driver's response is calculated on base of the call's descriptor (.token_size and .max_tokens fields) without taking into consideration the size of the buffer provided by application in struct iwreq. But when the response is being copied to userspace, its size is calculated from the length provided by application. This can lead to kernel internal data leak into userspace, and oopses when the buffer is located near the end of the available memory. To prevent these situations the size used during copying is set to the same one used during allocation. Signed-off-by: Volodymyr G Lukiianyk <volodymyrgl@xxxxxxxxx> --- I've actually seen those oopses on the system with 32MB of memory, when 1k object at address c1fffc00 was returned by the SLAB while handling request for allocating 568 bytes buffer (struct iw_range). Later, copy_to_user() (instructed to copy 1136 bytes, since iwlist uses 2x buffer) crashed trying to access c2000000, which is beyond the bounds of available 32MB. The patch attached is against the Linus's tree.
diff --git a/net/wireless/wext.c b/net/wireless/wext.c index 47e80cc..c6ce59b 100644 --- a/net/wireless/wext.c +++ b/net/wireless/wext.c @@ -866,8 +866,7 @@ static int ioctl_standard_call(struct net_device * dev, } err = copy_to_user(iwr->u.data.pointer, extra, - iwr->u.data.length * - descr->token_size); + extra_size); if (err) ret = -EFAULT; }