Skip to content

Commit

Permalink
module: fix validate_section_offset() overflow bug on 64-bit
Browse files Browse the repository at this point in the history
validate_section_offset() uses unsigned long local variable to
add/store shdr->sh_offset and shdr->sh_size on all platforms.
unsigned long is too short when sh_offset is Elf64_Off which
would be the case on 64bit ELF headers.

Without this fix applied we were shorting the design of modules
to have section headers placed within the 32-bit boundary (4 GiB)
instead of 64-bits when on 64-bit architectures (which allows for
up to 16,777,216 TiB). In practice this just meant we were limiting
modules sections to below 4 GiB even on 64-bit systems. This then
should not really affect any real-world use case as modules these
days obviously should likely never exceed 1 GiB in size overall.
A specially crafted invalid module might succeed to skip validation
in validate_section_offset() due to this mistake, but in such case
no impact is observed through code inspection given the correct data
types are used for the copy of the module when needed on move_module()
when the section type is not SHT_NOBITS (which indicates no the
section occupies no space on the file).

Fix the overflow problem using the right size local variable when
CONFIG_64BIT is defined.

Signed-off-by: Shuah Khan <[email protected]>
[mcgrof: expand commit log with possible impact if not applied]
Signed-off-by: Luis Chamberlain <[email protected]>
  • Loading branch information
shuahkh authored and mcgrof committed Nov 5, 2021
1 parent fe91c47 commit d83d42d
Showing 1 changed file with 4 additions and 0 deletions.
4 changes: 4 additions & 0 deletions kernel/module.c
Original file line number Diff line number Diff line change
Expand Up @@ -2942,7 +2942,11 @@ static int module_sig_check(struct load_info *info, int flags)

static int validate_section_offset(struct load_info *info, Elf_Shdr *shdr)
{
#if defined(CONFIG_64BIT)
unsigned long long secend;
#else
unsigned long secend;
#endif

/*
* Check for both overflow and offset/size being
Expand Down

0 comments on commit d83d42d

Please sign in to comment.