Am 29.10.2013 20:06, schrieb Dan Carpenter: > We don't cap the size of buffer from the user so we could write past > the end of the array here. Only root can write to this file. > > Reported-by: Nico Golde <n...@ngolde.de> > Reported-by: Fabian Yamaguchi <f...@goesec.de> > Signed-off-by: Dan Carpenter <dan.carpen...@oracle.com>
Thanks everyone! Patch applied and an it's way to Linus' tree. Thanks, //richard > diff --git a/arch/um/kernel/exitcode.c b/arch/um/kernel/exitcode.c > index 829df49..41ebbfe 100644 > --- a/arch/um/kernel/exitcode.c > +++ b/arch/um/kernel/exitcode.c > @@ -40,9 +40,11 @@ static ssize_t exitcode_proc_write(struct file *file, > const char __user *buffer, size_t count, loff_t *pos) > { > char *end, buf[sizeof("nnnnn\0")]; > + size_t size; > int tmp; > > - if (copy_from_user(buf, buffer, count)) > + size = min(count, sizeof(buf)); > + if (copy_from_user(buf, buffer, size)) > return -EFAULT; > > tmp = simple_strtol(buf, &end, 0); > ------------------------------------------------------------------------------ Android is increasing in popularity, but the open development platform that developers love is also attractive to malware creators. Download this white paper to learn more about secure code signing practices that can help keep Android apps secure. http://pubads.g.doubleclick.net/gampad/clk?id=65839951&iu=/4140/ostg.clktrk _______________________________________________ User-mode-linux-user mailing list User-mode-linux-user@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/user-mode-linux-user