[PATCH v2] habanalabs: fix information leak in sec_attest_info()
Oded Gabbay
ogabbay at kernel.org
Tue Dec 19 09:30:56 UTC 2023
On Fri, Dec 08, 2023 at 09:00:59PM +0800, Xingyuan Mo wrote:
> This function may copy the pad0 field of struct hl_info_sec_attest to user
> mode which has not been initialized, resulting in leakage of kernel heap
> data to user mode. To prevent this, use kzalloc() to allocate and zero out
> the buffer, which can also eliminate other uninitilized holes, if any.
>
> Fixes: 0c88760f8f5e ("habanalabs/gaudi2: add secured attestation info uapi")
> Signed-off-by: Xingyuan Mo <hdthky0 at gmail.com>
> ---
> drivers/accel/habanalabs/common/habanalabs_ioctl.c | 2 +-
> 1 file changed, 1 insertion(+), 1 deletion(-)
>
> diff --git a/drivers/accel/habanalabs/common/habanalabs_ioctl.c b/drivers/accel/habanalabs/common/habanalabs_ioctl.c
> index 8ef36effb95b..a7cd625d82c0 100644
> --- a/drivers/accel/habanalabs/common/habanalabs_ioctl.c
> +++ b/drivers/accel/habanalabs/common/habanalabs_ioctl.c
> @@ -685,7 +685,7 @@ static int sec_attest_info(struct hl_fpriv *hpriv, struct hl_info_args *args)
> if (!sec_attest_info)
> return -ENOMEM;
>
> - info = kmalloc(sizeof(*info), GFP_KERNEL);
> + info = kzalloc(sizeof(*info), GFP_KERNEL);
> if (!info) {
> rc = -ENOMEM;
> goto free_sec_attest_info;
> --
> 2.34.1
>
Reviewed-by: Oded Gabbay <ogabbay at kernel.org>
Applied to -next.
Thanks,
Oded
More information about the dri-devel
mailing list