[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20170718070001.GA5255@kroah.com>
Date: Tue, 18 Jul 2017 09:00:01 +0200
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: Jacob von Chorus <jacobvonchorus@...hoto.ca>
Cc: Insop Song <insop.song@...nspeed.com>, devel@...verdev.osuosl.org,
linux-kernel@...r.kernel.org, dan.carpenter@...cle.com
Subject: Re: [PATCH v2 1/2] staging: gs_fpgaboot: add buffer overflow checks
On Mon, Jul 17, 2017 at 08:47:25PM -0400, Jacob von Chorus wrote:
> Four fields in struct fpgaimage are char arrays of length MAX_STR (256).
> The amount of data read into these buffers is controlled by a length
> field in the bitstream file read from userspace. If a corrupt or
> malicious firmware file was supplied, kernel data beyond these buffers
> can be overwritten arbitrarily.
>
> This patch adds a check of the bitstream's length value to ensure it
> fits within the bounds of the allocated buffers. An error condition is
> returned from gs_read_bitstream if any of the reads fail.
>
> Signed-off-by: Jacob von Chorus <jacobvonchorus@...hoto.ca>
> ---
> drivers/staging/gs_fpgaboot/gs_fpgaboot.c | 48 ++++++++++++++++++++++++-------
> 1 file changed, 37 insertions(+), 11 deletions(-)
What changed from v1? Always list that below the --- line.
Please fix up and resend...
thanks,
greg k-h
Powered by blists - more mailing lists