Received: by 2002:a05:6a10:f3d0:0:0:0:0 with SMTP id a16csp2826997pxv; Mon, 12 Jul 2021 02:55:40 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwX9ckXIfgvcsi26OBIr4XCI5bmC2o38rEQbTb2qKdn+kyUQwHBab+UopWqEsQo1yH47RSK X-Received: by 2002:a5e:c905:: with SMTP id z5mr13979377iol.85.1626083740487; Mon, 12 Jul 2021 02:55:40 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1626083740; cv=none; d=google.com; s=arc-20160816; b=bV/qug8QB8GxNl5OMgltGZqlaK1NquVkf7yzxjkA4inM0b47c8rtzdYvAz1HhTtXig sDx9EWapnO6QB7MznVHBQPDa0aI/k/1wfeZ0A1MMutmKDLS9WnlO5FS+8VNVCUPbfVUl UW0kuq26m49no75Qe3QHwg8jZpTj/+lkCDLVWlQW80GgHk1tx2eR3uW+UELu0zJ97/Oi ye6aVv9bXsGyy2/NA+MDpwZwaTIgasUSljTU0wY6kNRKT+wl2AleJ0dCjsTBKViByDvE AyQ7VUjlxR/FtIg9x5r0+7NgFJSmw+N0+fKmYMXBJ/i1Tzs4xhsrtRKeX1g8eegMT5XR bioQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=3bSl3u0xeCOY367DkLjszNhAtY9KADEAXe2+GbaWDZ0=; b=JZQ7U7+TH4DTYlk6f5wz8utSyPZ5qfNfvxfBGQQdd5523KqzX0/7q5qM1c5z7NRiho p/xDSQ/hn0r2eI/4rC1dBWH/8BA8w9aJ7sK5LUQdUuvTr3hlS4kcdvgExJgH43vkl/L9 A0xgWxwpXsuitQhM6zK5zUiaomsvoxDc4r4V7bFPvMPSnuggU4nopVMxTTVrAL5MfwOY C6Av3lWE3iKgqnrPANF7ZMnauuRl7WQnZ025pOAGcVQEykIfVChF0oeziQ4NCi1iAvam CrTcgNmHhlS1XpwDFVW3WWJ7xNFo8xLWdhwsDqGWzjF9HaQDoNY3RlEjNIHj8K3SLH8a 2LPQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=ekZk6Fo4; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id s4si17556950ilv.54.2021.07.12.02.55.29; Mon, 12 Jul 2021 02:55:40 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=ekZk6Fo4; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S240006AbhGLG5q (ORCPT + 99 others); Mon, 12 Jul 2021 02:57:46 -0400 Received: from mail.kernel.org ([198.145.29.99]:34598 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236472AbhGLGlk (ORCPT ); Mon, 12 Jul 2021 02:41:40 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id EE27F610A7; Mon, 12 Jul 2021 06:38:44 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1626071925; bh=qu/ppItBccLaob3ba9bYAsnux2IVsD9fzTfShQCVPB8=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=ekZk6Fo4mKpCB356uScVTt/3k26qU8bDwqe8qadLrSZh37AZ3xZehnvVA6jUMbJIN vIrOP8Y00DXZr8uEKXE6Bsrn+W8vLxwQGsr6H6/Bmy6rWZ64INKgi+cym9UuupzpF/ LGlQTztHNCtmB8LinKmgxv4sfclimEsfGYsJ91Fs= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, =?UTF-8?q?Krzysztof=20Wilczy=C5=84ski?= , Bjorn Helgaas , "Rafael J. Wysocki" , Sasha Levin Subject: [PATCH 5.10 278/593] ACPI: sysfs: Fix a buffer overrun problem with description_show() Date: Mon, 12 Jul 2021 08:07:18 +0200 Message-Id: <20210712060914.570438730@linuxfoundation.org> X-Mailer: git-send-email 2.32.0 In-Reply-To: <20210712060843.180606720@linuxfoundation.org> References: <20210712060843.180606720@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Krzysztof Wilczyński [ Upstream commit 888be6067b97132c3992866bbcf647572253ab3f ] Currently, a device description can be obtained using ACPI, if the _STR method exists for a particular device, and then exposed to the userspace via a sysfs object as a string value. If the _STR method is available for a given device then the data (usually a Unicode string) is read and stored in a buffer (of the ACPI_TYPE_BUFFER type) with a pointer to said buffer cached in the struct acpi_device_pnp for later access. The description_show() function is responsible for exposing the device description to the userspace via a corresponding sysfs object and internally calls the utf16s_to_utf8s() function with a pointer to the buffer that contains the Unicode string so that it can be converted from UTF16 encoding to UTF8 and thus allowing for the value to be safely stored and later displayed. When invoking the utf16s_to_utf8s() function, the description_show() function also sets a limit of the data that can be saved into a provided buffer as a result of the character conversion to be a total of PAGE_SIZE, and upon completion, the utf16s_to_utf8s() function returns an integer value denoting the number of bytes that have been written into the provided buffer. Following the execution of the utf16s_to_utf8s() a newline character will be added at the end of the resulting buffer so that when the value is read in the userspace through the sysfs object then it would include newline making it more accessible when working with the sysfs file system in the shell, etc. Normally, this wouldn't be a problem, but if the function utf16s_to_utf8s() happens to return the number of bytes written to be precisely PAGE_SIZE, then we would overrun the buffer and write the newline character outside the allotted space which can have undefined consequences or result in a failure. To fix this buffer overrun, ensure that there always is enough space left for the newline character to be safely appended. Fixes: d1efe3c324ea ("ACPI: Add new sysfs interface to export device description") Signed-off-by: Krzysztof Wilczyński Reviewed-by: Bjorn Helgaas Signed-off-by: Rafael J. Wysocki Signed-off-by: Sasha Levin --- drivers/acpi/device_sysfs.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/acpi/device_sysfs.c b/drivers/acpi/device_sysfs.c index bfca116482b8..75e412b2b660 100644 --- a/drivers/acpi/device_sysfs.c +++ b/drivers/acpi/device_sysfs.c @@ -446,7 +446,7 @@ static ssize_t description_show(struct device *dev, (wchar_t *)acpi_dev->pnp.str_obj->buffer.pointer, acpi_dev->pnp.str_obj->buffer.length, UTF16_LITTLE_ENDIAN, buf, - PAGE_SIZE); + PAGE_SIZE - 1); buf[result++] = '\n'; -- 2.30.2