Here's what the Stanford checker said:
---------------------------------------------------------
[BUG] proc_dir_entry.write_proc
/home/junfeng/linux-2.5.63/drivers/media/video/
zoran_procfs.c:122:zoran_write_proc:
ERROR:TAINTED:122:122: passing tainted ptr 'buffer' to __memcpy
[Callstack:
/home/junfeng/linux-2.5.63/net/core/
pktgen.c:991:zoran_write_proc((tainted
1))]
string = sp = vmalloc(count + 1);
if (!string) {
printk(KERN_ERR "%s: write_proc: can not allocate
memory\n", zr->name);
return -ENOMEM;
}
Error --->
memcpy(string, buffer, count);
string[count] = 0;
DEBUG2(printk(KERN_INFO "%s: write_proc: name=%s count=%lu
data=%x\n", zr->name, file->f_dentry->d_name.name, count, (int) data));
ldelim = " \t\n";
---------------------------------------------------------
Is this patch correct?
-- Hollis Blanchard IBM Linux Technology Center--Apple-Mail-8-589579874 Content-Disposition: attachment; filename=zortan-memcpy.diff Content-Transfer-Encoding: 7bit Content-Type: application/octet-stream; x-unix-mode=0644; name="zortan-memcpy.diff"
--- linux-2.5.69/drivers/media/video/zoran_procfs.c.orig 2003-05-23 15:42:18.000000000 -0500 +++ linux-2.5.69/drivers/media/video/zoran_procfs.c 2003-05-23 15:42:40.000000000 -0500 @@ -119,7 +119,10 @@ printk(KERN_ERR "%s: write_proc: can not allocate memory\n", zr->name); return -ENOMEM; } - memcpy(string, buffer, count); + if (copy_from_user(string, buffer, count)) { + vfree(string); + return -EFAULT; + } string[count] = 0; DEBUG2(printk(KERN_INFO "%s: write_proc: name=%s count=%lu data=%x\n", zr->name, file->f_dentry->d_name.name, count, (int) data)); ldelim = " \t\n";
--Apple-Mail-8-589579874--
- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/