diff options
| author | Quentin Casasnovas <[email protected]> | 2015-02-03 12:00:24 +0000 |
|---|---|---|
| committer | Borislav Petkov <[email protected]> | 2015-02-19 11:42:23 +0000 |
| commit | 35a9ff4eec7a1725ac4364972fc6c156e4feedd0 (patch) | |
| tree | d77433b391eb3f7e9f85d46b720af0cd17be85f7 /drivers/net/xen-netback/interface.c | |
| parent | x86/microcode/intel: Guard against stack overflow in the loader (diff) | |
| download | kernel-35a9ff4eec7a1725ac4364972fc6c156e4feedd0.tar.gz kernel-35a9ff4eec7a1725ac4364972fc6c156e4feedd0.zip | |
x86/microcode/intel: Handle truncated microcode images more robustly
We do not check the input data bounds containing the microcode before
copying a struct microcode_intel_header from it. A specially crafted
microcode could cause the kernel to read invalid memory and lead to a
denial-of-service.
Signed-off-by: Quentin Casasnovas <[email protected]>
Cc: "H. Peter Anvin" <[email protected]>
Cc: Fenghua Yu <[email protected]>
Link: http://lkml.kernel.org/r/[email protected]
[ Made error message differ from the next one and flipped comparison. ]
Signed-off-by: Borislav Petkov <[email protected]>
Diffstat (limited to 'drivers/net/xen-netback/interface.c')
0 files changed, 0 insertions, 0 deletions
