[NETFILTER]: x_tables: don't use __copy_{from,to}_user on unchecked memory in compat layer
Noticed by Linus Torvalds <torvalds@osdl.org> Signed-off-by: Patrick McHardy <kaber@trash.net> Signed-off-by: David S. Miller <davem@davemloft.net>
This commit is contained in:
parent
7582e9d17e
commit
7800007c1e
|
@ -1441,7 +1441,7 @@ static int compat_copy_entry_to_user(struct ipt_entry *e,
|
|||
ret = -EFAULT;
|
||||
origsize = *size;
|
||||
ce = (struct compat_ipt_entry __user *)*dstptr;
|
||||
if (__copy_to_user(ce, e, sizeof(struct ipt_entry)))
|
||||
if (copy_to_user(ce, e, sizeof(struct ipt_entry)))
|
||||
goto out;
|
||||
|
||||
*dstptr += sizeof(struct compat_ipt_entry);
|
||||
|
@ -1459,9 +1459,9 @@ static int compat_copy_entry_to_user(struct ipt_entry *e,
|
|||
goto out;
|
||||
ret = -EFAULT;
|
||||
next_offset = e->next_offset - (origsize - *size);
|
||||
if (__put_user(target_offset, &ce->target_offset))
|
||||
if (put_user(target_offset, &ce->target_offset))
|
||||
goto out;
|
||||
if (__put_user(next_offset, &ce->next_offset))
|
||||
if (put_user(next_offset, &ce->next_offset))
|
||||
goto out;
|
||||
return 0;
|
||||
out:
|
||||
|
|
|
@ -289,7 +289,7 @@ int xt_compat_match(void *match, void **dstptr, int *size, int convert)
|
|||
case COMPAT_TO_USER:
|
||||
pm = (struct xt_entry_match *)match;
|
||||
msize = pm->u.user.match_size;
|
||||
if (__copy_to_user(*dstptr, pm, msize)) {
|
||||
if (copy_to_user(*dstptr, pm, msize)) {
|
||||
ret = -EFAULT;
|
||||
break;
|
||||
}
|
||||
|
@ -366,7 +366,7 @@ int xt_compat_target(void *target, void **dstptr, int *size, int convert)
|
|||
case COMPAT_TO_USER:
|
||||
pt = (struct xt_entry_target *)target;
|
||||
tsize = pt->u.user.target_size;
|
||||
if (__copy_to_user(*dstptr, pt, tsize)) {
|
||||
if (copy_to_user(*dstptr, pt, tsize)) {
|
||||
ret = -EFAULT;
|
||||
break;
|
||||
}
|
||||
|
|
Loading…
Reference in New Issue