Patchwork [3/3] vm: fix vm_pgoff wrap in upward expansion - CVE-2011-2496

login
register
mail settings
Submitter Paolo Pisati
Date Oct. 11, 2011, 2:17 p.m.
Message ID <1318342628-32016-4-git-send-email-paolo.pisati@canonical.com>
Download mbox | patch
Permalink /patch/118992/
State New
Headers show

Comments

Paolo Pisati - Oct. 11, 2011, 2:17 p.m.
Commit a626ca6a6564 ("vm: fix vm_pgoff wrap in stack expansion") fixed
the case of an expanding mapping causing vm_pgoff wrapping when you had
downward stack expansion.  But there was another case where IA64 and
PA-RISC expand mappings: upward expansion.

This fixes that case too.

BugLink: http://bugs.launchpad.net/bugs/869243

commit upstream 42c36f63ac1366ab0ecc2d5717821362c259f517

Signed-off-by: Hugh Dickins <hughd@google.com>
Cc: stable@kernel.org
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>

Signed-off-by: Paolo Pisati <paolo.pisati@canonical.com>
---
 mm/mmap.c |    9 ++++++---
 1 files changed, 6 insertions(+), 3 deletions(-)

Patch

diff --git a/mm/mmap.c b/mm/mmap.c
index dcd3dcc..b0d5d58 100644
--- a/mm/mmap.c
+++ b/mm/mmap.c
@@ -1600,9 +1600,12 @@  int expand_upwards(struct vm_area_struct *vma, unsigned long address)
 		size = address - vma->vm_start;
 		grow = (address - vma->vm_end) >> PAGE_SHIFT;
 
-		error = acct_stack_growth(vma, size, grow);
-		if (!error)
-			vma->vm_end = address;
+		error = -ENOMEM;
+		if (vma->vm_pgoff + (size >> PAGE_SHIFT) >= vma->vm_pgoff) {
+			error = acct_stack_growth(vma, size, grow);
+			if (!error)
+				vma->vm_end = address;
+		}
 	}
 	anon_vma_unlock(vma);
 	return error;