diff options
author | Jacob von Chorus <jacobvonchorus@cwphoto.ca> | 2017-07-28 17:06:16 -0400 |
---|---|---|
committer | Greg Kroah-Hartman <gregkh@linuxfoundation.org> | 2017-07-28 17:07:37 -0700 |
commit | a46393aba77c870ef73beb417c48af4df43cb342 (patch) | |
tree | 084fe9dd76bfe0e49ef22e436adb528b86a73dde /drivers/iio/trigger/stm32-timer-trigger.c | |
parent | ee714b80eaf7da35d82d663546c22d8cd016e8aa (diff) | |
download | linux-a46393aba77c870ef73beb417c48af4df43cb342.tar.gz linux-a46393aba77c870ef73beb417c48af4df43cb342.tar.bz2 linux-a46393aba77c870ef73beb417c48af4df43cb342.zip |
staging: gs_fpgaboot: add buffer overflow checks
Four fields in struct fpgaimage are char arrays of length MAX_STR (256).
The amount of data read into these buffers is controlled by a length
field in the bitstream file read from userspace. If a corrupt or
malicious firmware file was supplied, kernel data beyond these buffers
can be overwritten arbitrarily.
This patch adds a check of the bitstream's length value to ensure it
fits within the bounds of the allocated buffers. An error condition is
returned from gs_read_bitstream if any of the reads fail.
Signed-off-by: Jacob von Chorus <jacobvonchorus@cwphoto.ca>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'drivers/iio/trigger/stm32-timer-trigger.c')
0 files changed, 0 insertions, 0 deletions