Adding Jean. Luis On Jan 20, 2008 1:30 PM, Volodymyr G. Lukiianyk <volodymyrgl@xxxxxxxxx> wrote: > For the most of standard WE GET ioctls the size of the buffer to store driver's > response is calculated on base of the call's descriptor (.token_size and > .max_tokens fields) without taking into consideration the size of the buffer > provided by application in struct iwreq. But when the response is being copied to > userspace, its size is calculated from the length provided by application. This > can lead to kernel internal data leak into userspace, and oopses when the buffer > is located near the end of the available memory. To prevent these situations the > size used during copying is set to the same one used during allocation. > > > Signed-off-by: Volodymyr G Lukiianyk <volodymyrgl@xxxxxxxxx> > --- > > I've actually seen those oopses on the system with 32MB of memory, when 1k > object at address c1fffc00 was returned by the SLAB while handling request for > allocating 568 bytes buffer (struct iw_range). Later, copy_to_user() (instructed > to copy 1136 bytes, since iwlist uses 2x buffer) crashed trying to access > c2000000, which is beyond the bounds of available 32MB. > > The patch attached is against the Linus's tree. > > > diff --git a/net/wireless/wext.c b/net/wireless/wext.c > index 47e80cc..c6ce59b 100644 > --- a/net/wireless/wext.c > +++ b/net/wireless/wext.c > @@ -866,8 +866,7 @@ static int ioctl_standard_call(struct net_device * dev, > } > > err = copy_to_user(iwr->u.data.pointer, extra, > - iwr->u.data.length * > - descr->token_size); > + extra_size); > if (err) > ret = -EFAULT; > } > > - To unsubscribe from this list: send the line "unsubscribe linux-wireless" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html