[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <159418828151.5152.8891996577117678598.b4-ty@oracle.com>
Date: Wed, 8 Jul 2020 02:06:52 -0400
From: "Martin K. Petersen" <martin.petersen@...cle.com>
To: haiyangz@...rosoft.com, kys@...rosoft.com, sthemmin@...rosoft.com,
Andres Beltran <lkmlabelt@...il.com>, wei.liu@...nel.org
Cc: "Martin K . Petersen" <martin.petersen@...cle.com>,
mikelley@...rosoft.com,
"James E . J . Bottomley" <jejb@...ux.ibm.com>,
linux-scsi@...r.kernel.org, parri.andrea@...il.com,
linux-kernel@...r.kernel.org, skarade@...rosoft.com,
linux-hyperv@...r.kernel.org
Subject: Re: [PATCH] scsi: storvsc: Add validation for untrusted Hyper-V values
On Mon, 6 Jul 2020 12:09:28 -0400, Andres Beltran wrote:
> For additional robustness in the face of Hyper-V errors or malicious
> behavior, validate all values that originate from packets that
> Hyper-V has sent to the guest. Ensure that invalid values cannot
> cause data being copied out of the bounds of the source buffer
> when calling memcpy. Ensure that outgoing packets do not have any
> leftover guest memory that has not been zeroed out.
Applied to 5.9/scsi-queue, thanks!
[1/1] scsi: storvsc: Add validation for untrusted Hyper-V values
https://git.kernel.org/mkp/scsi/c/0a76566595bf
--
Martin K. Petersen Oracle Linux Engineering
Powered by blists - more mailing lists