From: Eric Paris Date: Wed, 19 Dec 2007 12:59:32 +0000 (+0100) Subject: VM/Security: add security hook to do_brk (CVE-2007-6434) X-Git-Tag: v2.6.23.15~19 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=a0209f336a1dff0363b558a972eb71eef74e0084;p=thirdparty%2Fkernel%2Fstable.git VM/Security: add security hook to do_brk (CVE-2007-6434) patch ecaf18c15aac8bb9bed7b7aa0e382fe252e275d5 in mainline. VM/Security: add security hook to do_brk Given a specifically crafted binary do_brk() can be used to get low pages available in userspace virtual memory and can thus be used to circumvent the mmap_min_addr low memory protection. Add security checks in do_brk(). Signed-off-by: Eric Paris Acked-by: Alan Cox Cc: Stephen Smalley Cc: James Morris Cc: Chris Wright Cc: maximilian attems Signed-off-by: Andrew Morton Signed-off-by: Linus Torvalds Signed-off-by: Greg Kroah-Hartman --- diff --git a/mm/mmap.c b/mm/mmap.c index 0d40e66c841b2..5c214334d89e0 100644 --- a/mm/mmap.c +++ b/mm/mmap.c @@ -1938,6 +1938,10 @@ unsigned long do_brk(unsigned long addr, unsigned long len) if (is_hugepage_only_range(mm, addr, len)) return -EINVAL; + error = security_file_mmap(0, 0, 0, 0, addr, 1); + if (error) + return error; + flags = VM_DATA_DEFAULT_FLAGS | VM_ACCOUNT | mm->def_flags; error = arch_mmap_check(addr, len, flags);