[PATCH][SRU][YAKKETY][XENIAL][TRUSTY] KEYS: ensure xbuf is large enough to fix buffer overflow in proc_keys_show (LP: #1634496)
Colin King
colin.king at canonical.com
Tue Oct 18 13:43:38 UTC 2016
From: Colin Ian King <colin.king at canonical.com>
BugLink: http://bugs.launchpad.net/bugs/1634496
CVE-2016-7042
When stack protect is enabled xbuf is too small for timeout data causing a
buffer overflow and a stack protector corruption report.
OriginalAuthor: Vladis Dronov <vdronov at redhat.com>
OriginalLocation: https://bugzilla.redhat.com/attachment.cgi?id=1200212&action=diff
Signed-off-by: Colin Ian King <colin.king at canonical.com>
---
security/keys/proc.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/security/keys/proc.c b/security/keys/proc.c
index f0611a6..b9f531c 100644
--- a/security/keys/proc.c
+++ b/security/keys/proc.c
@@ -181,7 +181,7 @@ static int proc_keys_show(struct seq_file *m, void *v)
struct timespec now;
unsigned long timo;
key_ref_t key_ref, skey_ref;
- char xbuf[12];
+ char xbuf[16];
int rc;
struct keyring_search_context ctx = {
--
2.9.3
More information about the kernel-team
mailing list