Project

General

Profile

Actions

Feature #2771

open

111: Check that integer underflow doesn't happen in call of copy_from_user(), copy_to_user() and others

Added by Evgeny Novikov almost 12 years ago. Updated over 9 years ago.

Status:
Open
Priority:
Normal
Start date:
04/19/2012
Due date:
% Done:

90%

Estimated time:
Published in build:

Description

Somebody can pass negative values as a number of bytes to be copied from user. But copy_from_user() (and some similar functions) expects unsigned long int value, so negative values will lead to integer underflow. This issue belongs to specific:check_params, but also can be treated as generic:int_overflow. Commit 064368f of linux-stable represents the issue. Model 111_2a will take care on it.
And in additional 111_2a check if number of bytes is less than buffer's size.

Links
Sample bugfixes 42f9f8d, 5c9843a, 064368f, 5934df9

Actions

Also available in: Atom PDF