提交 be1c1391 编写于 作者: A Alexander Potapenko 提交者: Shile Zhang

fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()

to #27338374

commit 1d605416fb7175e1adf094251466caa52093b413 upstream.

KMSAN reported uninitialized data being written to disk when dumping
core.  As a result, several kilobytes of kmalloc memory may be written
to the core file and then read by a non-privileged user.
Reported-by: Nsam <sunhaoyl@outlook.com>
Signed-off-by: NAlexander Potapenko <glider@google.com>
Signed-off-by: NAndrew Morton <akpm@linux-foundation.org>
Acked-by: NKees Cook <keescook@chromium.org>
Cc: Al Viro <viro@zeniv.linux.org.uk>
Cc: Alexey Dobriyan <adobriyan@gmail.com>
Cc: <stable@vger.kernel.org>
Link: http://lkml.kernel.org/r/20200419100848.63472-1-glider@google.com
Link: https://github.com/google/kmsan/issues/76Signed-off-by: NLinus Torvalds <torvalds@linux-foundation.org>
Signed-off-by: NSasha Levin <sashal@kernel.org>
Reference: CVE-2020-10732
Signed-off-by: NShile Zhang <shile.zhang@linux.alibaba.com>
Acked-by: NJoseph Qi <joseph.qi@linux.alibaba.com>
上级 262d517b
...@@ -1766,7 +1766,7 @@ static int fill_thread_core_info(struct elf_thread_core_info *t, ...@@ -1766,7 +1766,7 @@ static int fill_thread_core_info(struct elf_thread_core_info *t,
(!regset->active || regset->active(t->task, regset) > 0)) { (!regset->active || regset->active(t->task, regset) > 0)) {
int ret; int ret;
size_t size = regset_size(t->task, regset); size_t size = regset_size(t->task, regset);
void *data = kmalloc(size, GFP_KERNEL); void *data = kzalloc(size, GFP_KERNEL);
if (unlikely(!data)) if (unlikely(!data))
return 0; return 0;
ret = regset->get(t->task, regset, ret = regset->get(t->task, regset,
......
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册