Received: by 2002:a17:90a:88:0:0:0:0 with SMTP id a8csp53121pja; Fri, 22 Nov 2019 03:21:06 -0800 (PST) X-Google-Smtp-Source: APXvYqzr+99yC5G9F0JvG06MILkXhqv3NS8F6XEu/FW4I4tiWTELIZYDuW1PA2xVl6YuYBknGci+ X-Received: by 2002:aa7:d0c1:: with SMTP id u1mr401748edo.27.1574421666811; Fri, 22 Nov 2019 03:21:06 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1574421666; cv=none; d=google.com; s=arc-20160816; b=tYy5gj8rPkPXGqqf3U0E5JlBxx389vTYR/HfCo5bIl1CYTYVjmRgeLrsH+/vYiHkmC +br/dLrs0tByn80xh4TxUtDnKa4uitwivPdhf8k43zr0TBtRQQUFo0xjhYv/xG0zj++5 kqdrprGCz4GWY2/uIZpnHfLcyEFaZwoaq+xa838Zr06ph/o68b1NNHaolS0isSxvX//S w5OREKCNuS9jFpwpX4+asz2EKlKUQZmky19RI9mVA9UTpVdJfL5UNokkPmcLRLr673Ys 4a+0RRxkjFADjLPP8xogb7QVn06AJoaQNz0k+YCNZNXpH89Aes2cyKeJ35cU75f1Jf4t AHZg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=W4diSh+zbHEdHDAwr7TxXLjQ/6QPm7EB4BYBldNes30=; b=r9ugPCUISAdo3RcRF6uiqVDswXP+h6cB0ZO89xMtLHvj1uovQiF0LUJ8GkLjajGi0X dT1HZqbw2FUJZKPWSZn94XL1TvAwE/b2b5S8R2HealXX/WnGWHPRM0bRft0LHsfkimXQ naNN/XMj/2mnwbrNSFPyeM18glFfoJ2bDPu7it2nb5hwzyxK/MzAWSfM/1UtZRa4oxw9 ZTHmhEmi4QW2ZTEEyTBqY/ZC9uY9ZB1M9m1/NM1KjlCU/yznETgE+USJPtgBQ2IuCNNl g3v9jyZhXbhN1Fw1XVM0UQAw+gUSFxC5BjQhY+PDuWHmFp+6/+e0VJhKm8jnBCPFdyRL W+2g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=CBRXYM9n; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e10si3878999ejq.413.2019.11.22.03.20.41; Fri, 22 Nov 2019 03:21:06 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=CBRXYM9n; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728753AbfKVKsU (ORCPT + 99 others); Fri, 22 Nov 2019 05:48:20 -0500 Received: from mail.kernel.org ([198.145.29.99]:56964 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729899AbfKVKsS (ORCPT ); Fri, 22 Nov 2019 05:48:18 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id C58D620656; Fri, 22 Nov 2019 10:48:16 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1574419697; bh=NGvcGUUb/zX84EsKjg1TLdH6Al2JKVLtjEr2dAXuSVE=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=CBRXYM9nnLo0ZM43z25xuJFxMYl0j00ObzX8YsQ/q4brJLk/h39HY1ZnXbSoC+rv5 COqsMU0/P9TfucbCbwj/7xEVPUbQkG+eDnUH38kw0WI4GxPrl5x4kcrxhsXXsw9bzD TPfuIb5ffpgWyCKtJ9XOZPg2E5pdVPx64KK34Oc4= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Dan Carpenter , Peter Malone , Philippe Ombredanne , Mathieu Malaterre , Bartlomiej Zolnierkiewicz , Sasha Levin Subject: [PATCH 4.9 200/222] fbdev: sbuslib: integer overflow in sbusfb_ioctl_helper() Date: Fri, 22 Nov 2019 11:29:00 +0100 Message-Id: <20191122100916.671409720@linuxfoundation.org> X-Mailer: git-send-email 2.24.0 In-Reply-To: <20191122100830.874290814@linuxfoundation.org> References: <20191122100830.874290814@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Dan Carpenter [ Upstream commit e5017716adb8aa5c01c52386c1b7470101ffe9c5 ] The "index + count" addition can overflow. Both come directly from the user. This bug leads to an information leak. Signed-off-by: Dan Carpenter Cc: Peter Malone Cc: Philippe Ombredanne Cc: Mathieu Malaterre Signed-off-by: Bartlomiej Zolnierkiewicz Signed-off-by: Sasha Levin --- drivers/video/fbdev/sbuslib.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/video/fbdev/sbuslib.c b/drivers/video/fbdev/sbuslib.c index b425718925c01..52e161dbd2047 100644 --- a/drivers/video/fbdev/sbuslib.c +++ b/drivers/video/fbdev/sbuslib.c @@ -170,7 +170,7 @@ int sbusfb_ioctl_helper(unsigned long cmd, unsigned long arg, get_user(ublue, &c->blue)) return -EFAULT; - if (index + count > cmap->len) + if (index > cmap->len || count > cmap->len - index) return -EINVAL; for (i = 0; i < count; i++) { -- 2.20.1