projects
/
wrapfs-3.14.y.git
/ commitdiff
commit
grep
author
committer
pickaxe
?
search:
re
summary
|
shortlog
|
log
|
commit
| commitdiff |
tree
raw
|
patch
| inline |
side by side
(parent:
381bde7
)
virtio_console: Assure used length from device is limited
author
Xie Yongji
<xieyongji@bytedance.com>
Tue, 25 May 2021 12:56:22 +0000
(20:56 +0800)
committer
Greg Kroah-Hartman
<gregkh@linuxfoundation.org>
Tue, 20 Jul 2021 14:22:43 +0000
(16:22 +0200)
[ Upstream commit
d00d8da5869a2608e97cfede094dfc5e11462a46
]
The buf->len might come from an untrusted device. This
ensures the value would not exceed the size of the buffer
to avoid data corruption or loss.
Signed-off-by: Xie Yongji <xieyongji@bytedance.com>
Acked-by: Jason Wang <jasowang@redhat.com>
Link:
https://lore.kernel.org/r/20210525125622.1203-1-xieyongji@bytedance.com
Signed-off-by: Michael S. Tsirkin <mst@redhat.com>
Signed-off-by: Sasha Levin <sashal@kernel.org>
drivers/char/virtio_console.c
patch
|
blob
|
history
diff --git
a/drivers/char/virtio_console.c
b/drivers/char/virtio_console.c
index 226ccb7891d4d6b25aa5b9335b1a4e8c7a3fee85..c2f1c921cb2c1afbc8c9240d45f91db6703fc31f 100644
(file)
--- a/
drivers/char/virtio_console.c
+++ b/
drivers/char/virtio_console.c
@@
-487,7
+487,7
@@
static struct port_buffer *get_inbuf(struct port *port)
buf = virtqueue_get_buf(port->in_vq, &len);
if (buf) {
- buf->len =
len
;
+ buf->len =
min_t(size_t, len, buf->size)
;
buf->offset = 0;
port->stats.bytes_received += len;
}
@@
-1752,7
+1752,7
@@
static void control_work_handler(struct work_struct *work)
while ((buf = virtqueue_get_buf(vq, &len))) {
spin_unlock(&portdev->c_ivq_lock);
- buf->len =
len
;
+ buf->len =
min_t(size_t, len, buf->size)
;
buf->offset = 0;
handle_control_message(vq->vdev, portdev, buf);