[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <176184141934.2037838.2419455993784869828.b4-ty@kernel.org>
Date: Thu, 30 Oct 2025 16:23:39 +0000
From: Marc Zyngier <maz@...nel.org>
To: oliver.upton@...ux.dev,
	will@...nel.org,
	catalin.marinas@....com,
	suzuki.poulose@....com,
	kvmarm@...ts.linux.dev,
	linux-arm-kernel@...ts.infradead.org,
	linux-kernel@...r.kernel.org,
	joey.gouly@....com,
	Sebastian Ene <sebastianene@...gle.com>
Cc: ayrton@...gle.com,
	yuzenghui@...wei.com,
	qperret@...gle.com,
	vdonnefort@...gle.com,
	kernel-team@...roid.com
Subject: Re: [PATCH] KVM: arm64: Check the untrusted offset in FF-A memory share
On Fri, 17 Oct 2025 07:57:10 +0000, Sebastian Ene wrote:
> Verify the offset to prevent OOB access in the hypervisor
> FF-A buffer in case an untrusted large enough value
> [U32_MAX - sizeof(struct ffa_composite_mem_region) + 1, U32_MAX]
> is set from the host kernel.
> 
> 
Applied to fixes, thanks!
[1/1] KVM: arm64: Check the untrusted offset in FF-A memory share
      commit: 103e17aac09cdd358133f9e00998b75d6c1f1518
Cheers,
	M.
-- 
Without deviation from the norm, progress is not possible.
Powered by blists - more mailing lists
 
