From: Matt Mackall Date: Sat, 6 Oct 2007 22:27:53 +0000 (+0200) Subject: random: fix bound check ordering (CVE-2007-3105) X-Git-Tag: v2.6.16.55-rc1~4 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=47d9c7762bd6e2d766cba697952f11fba9d5acf6;p=thirdparty%2Fkernel%2Fstable.git random: fix bound check ordering (CVE-2007-3105) If root raised the default wakeup threshold over the size of the output pool, the pool transfer function could overflow the stack with RNG bytes, causing a DoS or potential privilege escalation. (Bug reported by the PaX Team ) Signed-off-by: Matt Mackall Signed-off-by: Adrian Bunk --- diff --git a/drivers/char/random.c b/drivers/char/random.c index f162618d0f7ff..3b0f11d684086 100644 --- a/drivers/char/random.c +++ b/drivers/char/random.c @@ -691,9 +691,14 @@ static void xfer_secondary_pool(struct entropy_store *r, size_t nbytes) if (r->pull && r->entropy_count < nbytes * 8 && r->entropy_count < r->poolinfo->POOLBITS) { - int bytes = max_t(int, random_read_wakeup_thresh / 8, - min_t(int, nbytes, sizeof(tmp))); + /* If we're limited, always leave two wakeup worth's BITS */ int rsvd = r->limit ? 0 : random_read_wakeup_thresh/4; + int bytes = nbytes; + + /* pull at least as many as BYTES as wakeup BITS */ + bytes = max_t(int, bytes, random_read_wakeup_thresh / 8); + /* but never more than the buffer size */ + bytes = min_t(int, bytes, sizeof(tmp)); DEBUG_ENT("going to reseed %s with %d bits " "(%d of %d requested)\n",