aboutsummaryrefslogtreecommitdiffstats
path: root/drivers/iio/trigger/stm32-timer-trigger.c
diff options
context:
space:
mode:
authorJacob von Chorus <[email protected]>2017-07-28 21:06:16 +0000
committerGreg Kroah-Hartman <[email protected]>2017-07-29 00:07:37 +0000
commita46393aba77c870ef73beb417c48af4df43cb342 (patch)
tree084fe9dd76bfe0e49ef22e436adb528b86a73dde /drivers/iio/trigger/stm32-timer-trigger.c
parentstaging: skein: move macros into header file (diff)
downloadkernel-a46393aba77c870ef73beb417c48af4df43cb342.tar.gz
kernel-a46393aba77c870ef73beb417c48af4df43cb342.zip
staging: gs_fpgaboot: add buffer overflow checks
Four fields in struct fpgaimage are char arrays of length MAX_STR (256). The amount of data read into these buffers is controlled by a length field in the bitstream file read from userspace. If a corrupt or malicious firmware file was supplied, kernel data beyond these buffers can be overwritten arbitrarily. This patch adds a check of the bitstream's length value to ensure it fits within the bounds of the allocated buffers. An error condition is returned from gs_read_bitstream if any of the reads fail. Signed-off-by: Jacob von Chorus <[email protected]> Signed-off-by: Greg Kroah-Hartman <[email protected]>
Diffstat (limited to 'drivers/iio/trigger/stm32-timer-trigger.c')
0 files changed, 0 insertions, 0 deletions