• C
    sysctl: handle overflow in proc_get_long · 5945ee58
    Christian Brauner 提交于
    mainline inclusion
    from mainline-5.1-rc1
    commit 7f2923c4f73f21cfd714d12a2d48de8c21f11cfe
    category: bugfix
    bugzilla: 11917
    CVE: NA
    
    -------------------------------------------------
    proc_get_long() is a funny function.  It uses simple_strtoul() and for a
    good reason.  proc_get_long() wants to always succeed the parse and
    return the maybe incorrect value and the trailing characters to check
    against a pre-defined list of acceptable trailing values.  However,
    simple_strtoul() explicitly ignores overflows which can cause funny
    things like the following to happen:
    
      echo 18446744073709551616 > /proc/sys/fs/file-max
      cat /proc/sys/fs/file-max
      0
    
    (Which will cause your system to silently die behind your back.)
    
    On the other hand kstrtoul() does do overflow detection but does not
    return the trailing characters, and also fails the parse when anything
    other than '\n' is a trailing character whereas proc_get_long() wants to
    be more lenient.
    
    Now, before adding another kstrtoul() function let's simply add a static
    parse strtoul_lenient() which:
     - fails on overflow with -ERANGE
     - returns the trailing characters to the caller
    
    The reason why we should fail on ERANGE is that we already do a partial
    fail on overflow right now.  Namely, when the TMPBUFLEN is exceeded.  So
    we already reject values such as 184467440737095516160 (21 chars) but
    accept values such as 18446744073709551616 (20 chars) but both are
    overflows.  So we should just always reject 64bit overflows and not
    special-case this based on the number of chars.
    
    Link: http://lkml.kernel.org/r/20190107222700.15954-2-christian@brauner.ioSigned-off-by: NChristian Brauner <christian@brauner.io>
    Acked-by: NKees Cook <keescook@chromium.org>
    Cc: "Eric W. Biederman" <ebiederm@xmission.com>
    Cc: Luis Chamberlain <mcgrof@kernel.org>
    Cc: Joe Lawrence <joe.lawrence@redhat.com>
    Cc: Waiman Long <longman@redhat.com>
    Cc: Dominik Brodowski <linux@dominikbrodowski.net>
    Cc: Al Viro <viro@zeniv.linux.org.uk>
    Cc: Alexey Dobriyan <adobriyan@gmail.com>
    Signed-off-by: NAndrew Morton <akpm@linux-foundation.org>
    Signed-off-by: NLinus Torvalds <torvalds@linux-foundation.org>
    (cherry picked from commit 7f2923c4f73f21cfd714d12a2d48de8c21f11cfe)
    Signed-off-by: NZhen Lei <thunder.leizhen@huawei.com>
    Reviewed-by: NYang Yingliang <yangyingliang@huawei.com>
    Signed-off-by: NYang Yingliang <yangyingliang@huawei.com>
    5945ee58
sysctl.c 77.4 KB