ACK: [Precise, Trusty][SRU][PATCH 1/1] [stable-only] pipe: Fix buffer offset after partially failed read

Luis Henriques luis.henriques at canonical.com
Thu Mar 31 13:21:23 UTC 2016


On Wed, Mar 30, 2016 at 08:08:59AM -0700, Kamal Mostafa wrote:
> From: Ben Hutchings <ben at decadent.org.uk>
> 
> BugLink: https://launchpad.net/bugs/1563916
> 
> This 'stable-only' patch (lifted from 3.2.78) is required to fix CVE-2016-0774
> in Precise and Trusty.
> 
> The patch is pending in 3.13-stable, but Trusty needs it asap.
> 
> Precise can acquire it by this SRU or via 3.2.78.
>

This fix has been already applied to upstream stable kernels 2.6.32, 3.2,
3.12 and will soon be in 3.13.  The Precise fix is already applied to the
master-next branch through upstream stable release 3.2.78.

Cheers,
--
Luís


>  -Kamal
> 
> -----8<-----------------------------------------------------------------
> 
> BugLink: https://launchpad.net/bugs/1563916
> 
> Quoting the RHEL advisory:
> 
> > It was found that the fix for CVE-2015-1805 incorrectly kept buffer
> > offset and buffer length in sync on a failed atomic read, potentially
> > resulting in a pipe buffer state corruption. A local, unprivileged user
> > could use this flaw to crash the system or leak kernel memory to user
> > space. (CVE-2016-0774, Moderate)
> 
> The same flawed fix was applied to stable branches from 2.6.32.y to
> 3.14.y inclusive, and I was able to reproduce the issue on 3.2.y.
> We need to give pipe_iov_copy_to_user() a separate offset variable
> and only update the buffer offset if it succeeds.
> 
> References: https://rhn.redhat.com/errata/RHSA-2016-0103.html
> Signed-off-by: Ben Hutchings <ben at decadent.org.uk>
> References: https://lkml.org/lkml/2016/2/23/812
> Signed-off-by: Kamal Mostafa <kamal at canonical.com>
> ---
>  fs/pipe.c | 5 ++++-
>  1 file changed, 4 insertions(+), 1 deletion(-)
> 
> diff --git a/fs/pipe.c b/fs/pipe.c
> index 47f79ac..c281867 100644
> --- a/fs/pipe.c
> +++ b/fs/pipe.c
> @@ -407,6 +407,7 @@ pipe_read(struct kiocb *iocb, const struct iovec *_iov,
>  			void *addr;
>  			size_t chars = buf->len, remaining;
>  			int error, atomic;
> +			int offset;
>  
>  			if (chars > total_len)
>  				chars = total_len;
> @@ -420,9 +421,10 @@ pipe_read(struct kiocb *iocb, const struct iovec *_iov,
>  
>  			atomic = !iov_fault_in_pages_write(iov, chars);
>  			remaining = chars;
> +			offset = buf->offset;
>  redo:
>  			addr = ops->map(pipe, buf, atomic);
> -			error = pipe_iov_copy_to_user(iov, addr, &buf->offset,
> +			error = pipe_iov_copy_to_user(iov, addr, &offset,
>  						      &remaining, atomic);
>  			ops->unmap(pipe, buf, addr);
>  			if (unlikely(error)) {
> @@ -438,6 +440,7 @@ redo:
>  				break;
>  			}
>  			ret += chars;
> +			buf->offset += chars;
>  			buf->len -= chars;
>  
>  			/* Was it a packet buffer? Clean up and exit */
> -- 
> 2.7.4
> 
> 
> -- 
> kernel-team mailing list
> kernel-team at lists.ubuntu.com
> https://lists.ubuntu.com/mailman/listinfo/kernel-team




More information about the kernel-team mailing list