[PATCH 4/4] exec: copy-and-paste the fixes into compat_do_execve() paths - CVE-2010-NNN3
Stefan Bader
stefan.bader at canonical.com
Mon Jul 4 15:35:54 UTC 2011
On 04.07.2011 12:03, paolo.pisati at canonical.com wrote:
> From: Oleg Nesterov <oleg at redhat.com>
>
> BugLink: http://bugs.launchpad.net/bugs/804234
>
> commit 114279be2120a916e8a04feeb2ac976a10016f2f upstream.
>
> Note: this patch targets 2.6.37 and tries to be as simple as possible.
> That is why it adds more copy-and-paste horror into fs/compat.c and
> uglifies fs/exec.c, this will be cleanuped later.
>
> compat_copy_strings() plays with bprm->vma/mm directly and thus has
> two problems: it lacks the RLIMIT_STACK check and argv/envp memory
> is not visible to oom killer.
>
> Export acct_arg_size() and get_arg_page(), change compat_copy_strings()
> to use get_arg_page(), change compat_do_execve() to do acct_arg_size(0)
> as do_execve() does.
>
> Add the fatal_signal_pending/cond_resched checks into compat_count() and
> compat_copy_strings(), this matches the code in fs/exec.c and certainly
> makes sense.
>
> CVE-2010-NNN3
>
> Signed-off-by: Oleg Nesterov <oleg at redhat.com>
> Cc: KOSAKI Motohiro <kosaki.motohiro at jp.fujitsu.com>
> Signed-off-by: Linus Torvalds <torvalds at linux-foundation.org>
> Signed-off-by: Andi Kleen <ak at linux.intel.com>
> Cc: Moritz Muehlenhoff <jmm at debian.org>
> Signed-off-by: Greg Kroah-Hartman <gregkh at suse.de>
> Signed-off-by: Tim Gardner <tim.gardner at canonical.com>
> Signed-off-by: Paolo Pisati <paolo.pisati at canonical.com>
> ---
> fs/compat.c | 28 +++++++++++++++-------------
> fs/exec.c | 8 ++++----
> include/linux/binfmts.h | 4 ++++
> 3 files changed, 23 insertions(+), 17 deletions(-)
>
> diff --git a/fs/compat.c b/fs/compat.c
> index 6d6f98f..fc6eeae 100644
> --- a/fs/compat.c
> +++ b/fs/compat.c
> @@ -1360,6 +1360,10 @@ static int compat_count(compat_uptr_t __user *argv, int max)
> argv++;
> if (i++ >= max)
> return -E2BIG;
> +
> + if (fatal_signal_pending(current))
> + return -ERESTARTNOHAND;
> + cond_resched();
> }
> }
> return i;
> @@ -1401,6 +1405,12 @@ static int compat_copy_strings(int argc, compat_uptr_t __user *argv,
> while (len > 0) {
> int offset, bytes_to_copy;
>
> + if (fatal_signal_pending(current)) {
> + ret = -ERESTARTNOHAND;
> + goto out;
> + }
> + cond_resched();
> +
> offset = pos % PAGE_SIZE;
> if (offset == 0)
> offset = PAGE_SIZE;
> @@ -1417,18 +1427,8 @@ static int compat_copy_strings(int argc, compat_uptr_t __user *argv,
> if (!kmapped_page || kpos != (pos & PAGE_MASK)) {
> struct page *page;
>
> -#ifdef CONFIG_STACK_GROWSUP
> - ret = expand_stack_downwards(bprm->vma, pos);
> - if (ret < 0) {
> - /* We've exceed the stack rlimit. */
> - ret = -E2BIG;
> - goto out;
> - }
> -#endif
> - ret = get_user_pages(current, bprm->mm, pos,
> - 1, 1, 1, &page, NULL);
> - if (ret <= 0) {
> - /* We've exceed the stack rlimit. */
> + page = get_arg_page(bprm, pos, 1);
> + if (!page) {
> ret = -E2BIG;
> goto out;
> }
> @@ -1549,8 +1549,10 @@ int compat_do_execve(char * filename,
> return retval;
>
> out:
> - if (bprm->mm)
> + if (bprm->mm) {
> + acct_arg_size(bprm, 0);
> mmput(bprm->mm);
> + }
>
> out_file:
> if (bprm->file) {
> diff --git a/fs/exec.c b/fs/exec.c
> index 7b125a8..3bc6c91 100644
> --- a/fs/exec.c
> +++ b/fs/exec.c
> @@ -159,7 +159,7 @@ out:
>
> #ifdef CONFIG_MMU
>
> -static void acct_arg_size(struct linux_binprm *bprm, unsigned long pages)
> +void acct_arg_size(struct linux_binprm *bprm, unsigned long pages)
> {
> struct mm_struct *mm = current->mm;
> long diff = (long)(pages - bprm->vma_pages);
> @@ -174,7 +174,7 @@ static void acct_arg_size(struct linux_binprm *bprm, unsigned long pages)
> up_write(&mm->mmap_sem);
> }
>
> -static struct page *get_arg_page(struct linux_binprm *bprm, unsigned long pos,
> +struct page *get_arg_page(struct linux_binprm *bprm, unsigned long pos,
> int write)
> {
> struct page *page;
> @@ -291,11 +291,11 @@ static bool valid_arg_len(struct linux_binprm *bprm, long len)
>
> #else
>
> -static inline void acct_arg_size(struct linux_binprm *bprm, unsigned long pages)
> +void acct_arg_size(struct linux_binprm *bprm, unsigned long pages)
> {
> }
>
> -static struct page *get_arg_page(struct linux_binprm *bprm, unsigned long pos,
> +struct page *get_arg_page(struct linux_binprm *bprm, unsigned long pos,
> int write)
> {
> struct page *page;
> diff --git a/include/linux/binfmts.h b/include/linux/binfmts.h
> index 48564ac..7f6c8e8 100644
> --- a/include/linux/binfmts.h
> +++ b/include/linux/binfmts.h
> @@ -60,6 +60,10 @@ struct linux_binprm{
> unsigned long loader, exec;
> };
>
> +extern void acct_arg_size(struct linux_binprm *bprm, unsigned long pages);
> +extern struct page *get_arg_page(struct linux_binprm *bprm, unsigned long pos,
> + int write);
> +
> #define BINPRM_FLAGS_ENFORCE_NONDUMP_BIT 0
> #define BINPRM_FLAGS_ENFORCE_NONDUMP (1 << BINPRM_FLAGS_ENFORCE_NONDUMP_BIT)
>
I don't find CVE-2010-NNN3 somehow. But NNN3 is usually only temporary and then
replaced by a real number...
More information about the kernel-team
mailing list