Fix: notification capture: handle userspace strings
authorMathieu Desnoyers <mathieu.desnoyers@efficios.com>
Tue, 6 Sep 2022 15:59:17 +0000 (11:59 -0400)
committerMathieu Desnoyers <mathieu.desnoyers@efficios.com>
Thu, 8 Sep 2022 13:39:05 +0000 (09:39 -0400)
commit9c16adb2f6a64da85be28e1d2d1c552809ce4f99
tree1983bde3850db9570cf04fbc6b0a674c309a3ca7
parent3bba89d97f74d5556f18d20b9aad27f4a30c465b
Fix: notification capture: handle userspace strings

The "user" attribute (copy from userspace) is not applied to string
field capture within event notifications. This leads to copy of strings
from user-space (e.g. `filename` field from sys_open) to end up using
strlen/memcpy on user-space data. This can cause kernel OOPS due to
unhandled page faults, and it also allows reading kernel memory through
the event notification capture mechanism. As a result, the users within
the `tracing` group can read arbitrary kernel memory.

Signed-off-by: Mathieu Desnoyers <mathieu.desnoyers@efficios.com>
Change-Id: I3241b144fea849004a3f0a19276506c9f1b0d5e5
src/lttng-event-notifier-notification.c
This page took 0.026412 seconds and 4 git commands to generate.