Dan Rosenberg 21c5977a83 alpha: fix several security issues
Fix several security issues in Alpha-specific syscalls.  Untested, but
mostly trivial.

1. Signedness issue in osf_getdomainname allows copying out-of-bounds
kernel memory to userland.

2. Signedness issue in osf_sysinfo allows copying large amounts of
kernel memory to userland.

3. Typo (?) in osf_getsysinfo bounds minimum instead of maximum copy
size, allowing copying large amounts of kernel memory to userland.

4. Usage of user pointer in osf_wait4 while under KERNEL_DS allows
privilege escalation via writing return value of sys_wait4 to kernel
memory.

Signed-off-by: Dan Rosenberg <drosenberg@vsecurity.com>
Cc: Richard Henderson <rth@twiddle.net>
Cc: Ivan Kokshaysky <ink@jurassic.park.msu.ru>
Cc: Matt Turner <mattst88@gmail.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2011-06-15 20:04:02 -07:00
..
2009-01-15 16:39:40 -08:00
2008-04-17 10:42:34 -04:00
2009-05-02 15:36:10 -07:00
2011-03-31 11:26:23 -03:00
2009-05-02 15:36:10 -07:00
2009-05-02 15:36:10 -07:00
2011-03-31 11:26:23 -03:00
2005-04-16 15:20:36 -07:00
2005-04-16 15:20:36 -07:00
2011-04-17 14:41:30 -07:00
2011-03-29 14:47:58 +02:00
2011-04-17 14:41:30 -07:00
2008-04-28 08:58:27 -07:00
2011-06-15 20:04:02 -07:00
2010-10-27 18:03:17 -07:00
2010-12-16 11:36:43 +01:00
2011-05-25 08:39:38 -07:00
2010-08-31 22:45:31 -04:00
2011-05-25 08:39:38 -07:00
2011-05-25 08:39:38 -07:00
2011-05-28 10:48:39 -07:00
2010-09-18 23:06:18 -04:00