summaryrefslogtreecommitdiff
path: root/drivers/crypto
diff options
context:
space:
mode:
authorDave Carroll <david.carroll@microsemi.com>2016-08-05 13:44:10 -0600
committerSasha Levin <alexander.levin@verizon.com>2016-08-31 19:26:17 -0400
commit30c2bbd8a7b7ff3b6849d6ce1a69d4db9e40183b (patch)
tree21d48ed0136bc7397f36287264c8352b16ad8481 /drivers/crypto
parent8b0f82fcce12161ce459e5a0de455eb4ef39b416 (diff)
downloadlinux-rt-30c2bbd8a7b7ff3b6849d6ce1a69d4db9e40183b.tar.gz
aacraid: Check size values after double-fetch from user
[ Upstream commit fa00c437eef8dc2e7b25f8cd868cfa405fcc2bb3 ] In aacraid's ioctl_send_fib() we do two fetches from userspace, one the get the fib header's size and one for the fib itself. Later we use the size field from the second fetch to further process the fib. If for some reason the size from the second fetch is different than from the first fix, we may encounter an out-of- bounds access in aac_fib_send(). We also check the sender size to insure it is not out of bounds. This was reported in https://bugzilla.kernel.org/show_bug.cgi?id=116751 and was assigned CVE-2016-6480. Reported-by: Pengfei Wang <wpengfeinudt@gmail.com> Fixes: 7c00ffa31 '[SCSI] 2.6 aacraid: Variable FIB size (updated patch)' Cc: stable@vger.kernel.org Signed-off-by: Dave Carroll <david.carroll@microsemi.com> Reviewed-by: Johannes Thumshirn <jthumshirn@suse.de> Signed-off-by: Martin K. Petersen <martin.petersen@oracle.com> Signed-off-by: Sasha Levin <alexander.levin@verizon.com>
Diffstat (limited to 'drivers/crypto')
0 files changed, 0 insertions, 0 deletions