summaryrefslogtreecommitdiffstats
path: root/platform-chrome-cros_ec_dev-double-fetch-bug-in-ioct.patch
diff options
context:
space:
mode:
Diffstat (limited to 'platform-chrome-cros_ec_dev-double-fetch-bug-in-ioct.patch')
-rw-r--r--platform-chrome-cros_ec_dev-double-fetch-bug-in-ioct.patch52
1 files changed, 0 insertions, 52 deletions
diff --git a/platform-chrome-cros_ec_dev-double-fetch-bug-in-ioct.patch b/platform-chrome-cros_ec_dev-double-fetch-bug-in-ioct.patch
deleted file mode 100644
index a685ff697..000000000
--- a/platform-chrome-cros_ec_dev-double-fetch-bug-in-ioct.patch
+++ /dev/null
@@ -1,52 +0,0 @@
-From 096cdc6f52225835ff503f987a0d68ef770bb78e Mon Sep 17 00:00:00 2001
-From: Dan Carpenter <dan.carpenter@oracle.com>
-Date: Tue, 21 Jun 2016 16:58:46 +0300
-Subject: [PATCH] platform/chrome: cros_ec_dev - double fetch bug in ioctl
-
-We verify "u_cmd.outsize" and "u_cmd.insize" but we need to make sure
-that those values have not changed between the two copy_from_user()
-calls. Otherwise it could lead to a buffer overflow.
-
-Additionally, cros_ec_cmd_xfer() can set s_cmd->insize to a lower value.
-We should use the new smaller value so we don't copy too much data to
-the user.
-
-Reported-by: Pengfei Wang <wpengfeinudt@gmail.com>
-Fixes: a841178445bb ('mfd: cros_ec: Use a zero-length array for command data')
-Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
-Reviewed-by: Kees Cook <keescook@chromium.org>
-Tested-by: Gwendal Grignou <gwendal@chromium.org>
-Cc: <stable@vger.kernel.org> # v4.2+
-Signed-off-by: Olof Johansson <olof@lixom.net>
----
- drivers/platform/chrome/cros_ec_dev.c | 8 +++++++-
- 1 file changed, 7 insertions(+), 1 deletion(-)
-
-diff --git a/drivers/platform/chrome/cros_ec_dev.c b/drivers/platform/chrome/cros_ec_dev.c
-index 6d8ee3b15872..8abd80dbcbed 100644
---- a/drivers/platform/chrome/cros_ec_dev.c
-+++ b/drivers/platform/chrome/cros_ec_dev.c
-@@ -151,13 +151,19 @@ static long ec_device_ioctl_xcmd(struct cros_ec_dev *ec, void __user *arg)
- goto exit;
- }
-
-+ if (u_cmd.outsize != s_cmd->outsize ||
-+ u_cmd.insize != s_cmd->insize) {
-+ ret = -EINVAL;
-+ goto exit;
-+ }
-+
- s_cmd->command += ec->cmd_offset;
- ret = cros_ec_cmd_xfer(ec->ec_dev, s_cmd);
- /* Only copy data to userland if data was received. */
- if (ret < 0)
- goto exit;
-
-- if (copy_to_user(arg, s_cmd, sizeof(*s_cmd) + u_cmd.insize))
-+ if (copy_to_user(arg, s_cmd, sizeof(*s_cmd) + s_cmd->insize))
- ret = -EFAULT;
- exit:
- kfree(s_cmd);
---
-2.5.5
-