summaryrefslogtreecommitdiff
path: root/COPYING
diff options
context:
space:
mode:
authorHung-Te Lin <hungte@chromium.org>2019-08-30 10:23:58 +0800
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>2019-09-21 07:15:29 +0200
commite28c683440a64c0a1451d54aeb41301f588a004a (patch)
tree6cf93b1c1a076840a2458c3956f795a2faf896fc /COPYING
parentbf81752d808cd31e18d9a8db6d92b73497aa48d2 (diff)
firmware: google: check if size is valid when decoding VPD data
commit 4b708b7b1a2c09fbdfff6b942ebe3a160213aacd upstream. The VPD implementation from Chromium Vital Product Data project used to parse data from untrusted input without checking if the meta data is invalid or corrupted. For example, the size from decoded content may be negative value, or larger than whole input buffer. Such invalid data may cause buffer overflow. To fix that, the size parameters passed to vpd_decode functions should be changed to unsigned integer (u32) type, and the parsing of entry header should be refactored so every size field is correctly verified before starting to decode. Fixes: ad2ac9d5c5e0 ("firmware: Google VPD: import lib_vpd source files") Signed-off-by: Hung-Te Lin <hungte@chromium.org> Cc: stable <stable@vger.kernel.org> Reviewed-by: Guenter Roeck <linux@roeck-us.net> Reviewed-by: Stephen Boyd <swboyd@chromium.org> Link: https://lore.kernel.org/r/20190830022402.214442-1-hungte@chromium.org Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'COPYING')
0 files changed, 0 insertions, 0 deletions