On Wed 2015-05-20 12:59:48, Marcin Niesluchowski wrote:
> Reading message with dict may cause user buffer overflow due to
> no limits of written dict and hardcoded user read buffer size.
> As limits of dict are not clear, it may be possible in extreme
> use case to trigger it (e.g. by driver passing some dict parameters
> from userland or other module logging large key-value data).
> 
> Truncate dict read by user when its size would cause user read
> buffer to overflow.
> 
> Bug was found during work on extension of kmsg enabling writing
> dict from userspace.

By coincidence, Tejun has already provided slightly different patch
for this problem, see https://lkml.org/lkml/2015/5/14/494

AFAIK, Tejun's patch already is in the -mm tree and thus on the way to
get merged.

I would prefer Tejun's solution.

Best Regards,
Petr

> 
> Signed-off-by: Marcin Niesluchowski <m.niesluc...@samsung.com>
> ---
>  kernel/printk/printk.c | 11 ++++++++++-
>  1 file changed, 10 insertions(+), 1 deletion(-)
> 
> diff --git a/kernel/printk/printk.c b/kernel/printk/printk.c
> index c099b08..b61602d 100644
> --- a/kernel/printk/printk.c
> +++ b/kernel/printk/printk.c
> @@ -505,6 +505,7 @@ int check_syslog_permissions(int type, bool from_file)
>       return security_syslog(type);
>  }
>  
> +#define USER_READ_LOG_BUF_LEN        8192
>  
>  /* /dev/kmsg - userspace message inject/listen interface */
>  struct devkmsg_user {
> @@ -512,7 +513,7 @@ struct devkmsg_user {
>       u32 idx;
>       enum log_flags prev;
>       struct mutex lock;
> -     char buf[8192];
> +     char buf[USER_READ_LOG_BUF_LEN];
>  };
>  
>  static ssize_t devkmsg_write(struct kiocb *iocb, struct iov_iter *from)
> @@ -648,21 +649,29 @@ static ssize_t devkmsg_read(struct file *file, char 
> __user *buf,
>                       unsigned char c = log_dict(msg)[i];
>  
>                       if (line) {
> +                             if (len >= USER_READ_LOG_BUF_LEN-1)
> +                                     break;
>                               user->buf[len++] = ' ';
>                               line = false;
>                       }
>  
>                       if (c == '\0') {
> +                             if (len >= USER_READ_LOG_BUF_LEN-1)
> +                                     break;
>                               user->buf[len++] = '\n';
>                               line = true;
>                               continue;
>                       }
>  
>                       if (c < ' ' || c >= 127 || c == '\\') {
> +                             if (len >= USER_READ_LOG_BUF_LEN-4)
> +                                     break;
>                               len += sprintf(user->buf + len, "\\x%02x", c);
>                               continue;
>                       }
>  
> +                     if (len >= USER_READ_LOG_BUF_LEN-1)
> +                             break;
>                       user->buf[len++] = c;
>               }
>               user->buf[len++] = '\n';
> -- 
> 1.9.1
> 
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Reply via email to