ACK: [CVE-2017-7487][PATCH T/Z] ipx: call ipxitf_put() in ioctl error path
Colin Ian King
colin.king at canonical.com
Fri Jul 21 08:59:43 UTC 2017
On 20/07/17 08:57, Po-Hsu Lin wrote:
> From: Dan Carpenter <dan.carpenter at oracle.com>
>
> CVE-2017-7487
>
> We should call ipxitf_put() if the copy_to_user() fails.
>
> Reported-by: 李强 <liqiang6-s at 360.cn>
> Signed-off-by: Dan Carpenter <dan.carpenter at oracle.com>
> Signed-off-by: David S. Miller <davem at davemloft.net>
> (cherry picked from commit ee0d8d8482345ff97a75a7d747efc309f13b0d80)
> Signed-off-by: Po-Hsu Lin <po-hsu.lin at canonical.com>
> ---
> net/ipx/af_ipx.c | 5 ++---
> 1 file changed, 2 insertions(+), 3 deletions(-)
>
> diff --git a/net/ipx/af_ipx.c b/net/ipx/af_ipx.c
> index 6857ae4..654e39d 100644
> --- a/net/ipx/af_ipx.c
> +++ b/net/ipx/af_ipx.c
> @@ -1183,11 +1183,10 @@ static int ipxitf_ioctl(unsigned int cmd, void __user *arg)
> sipx->sipx_network = ipxif->if_netnum;
> memcpy(sipx->sipx_node, ipxif->if_node,
> sizeof(sipx->sipx_node));
> - rc = -EFAULT;
> + rc = 0;
> if (copy_to_user(arg, &ifr, sizeof(ifr)))
> - break;
> + rc = -EFAULT;
> ipxitf_put(ipxif);
> - rc = 0;
> break;
> }
> case SIOCAIPXITFCRT:
>
Clean cherry pick. Looks good.
Acked-by: Colin Ian King <colin.king at canonical.com>
More information about the kernel-team
mailing list