There are two potential integer overflows in private_ioctl() if
userspace passes in a large sList.uItem / sNodeList.uItem.  The
subsequent call to kmalloc() would allocate a small buffer, leading
to a memory corruption.

Reported-by: Dan Rosenberg <[email protected]>
Signed-off-by: Xi Wang <[email protected]>
---
 drivers/staging/vt6655/ioctl.c |    8 ++++++++
 1 files changed, 8 insertions(+), 0 deletions(-)

diff --git a/drivers/staging/vt6655/ioctl.c b/drivers/staging/vt6655/ioctl.c
index 432a209..7fd5cc5 100644
--- a/drivers/staging/vt6655/ioctl.c
+++ b/drivers/staging/vt6655/ioctl.c
@@ -300,6 +300,10 @@ int private_ioctl(PSDevice pDevice, struct ifreq *rq)
                        result = -EFAULT;
                        break;
                }
+               if (sList.uItem > (ULONG_MAX - sizeof(SBSSIDList)) / 
sizeof(SBSSIDItem)) {
+                       result = -EINVAL;
+                       break;
+               }
                pList = (PSBSSIDList)kmalloc(sizeof(SBSSIDList) + (sList.uItem 
* sizeof(SBSSIDItem)), (int)GFP_ATOMIC);
                if (pList == NULL) {
                        result = -ENOMEM;
@@ -571,6 +575,10 @@ int private_ioctl(PSDevice pDevice, struct ifreq *rq)
                        result = -EFAULT;
                        break;
                }
+               if (sNodeList.uItem > (ULONG_MAX - sizeof(SNodeList)) / 
sizeof(SNodeItem)) {
+                       result = -EINVAL;
+                       break;
+               }
                pNodeList = (PSNodeList)kmalloc(sizeof(SNodeList) + 
(sNodeList.uItem * sizeof(SNodeItem)), (int)GFP_ATOMIC);
                if (pNodeList == NULL) {
                        result = -ENOMEM;
-- 
1.7.5.4


_______________________________________________
devel mailing list
[email protected]
http://driverdev.linuxdriverproject.org/mailman/listinfo/devel

Reply via email to