diff options
author | Harald Freudenberger <freude@linux.ibm.com> | 2021-04-20 08:23:12 +0200 |
---|---|---|
committer | Heiko Carstens <hca@linux.ibm.com> | 2021-04-21 12:32:12 +0200 |
commit | 28096067686c5a5cbd4c35b079749bd805df5010 (patch) | |
tree | 3ad7f13a743e387d6fa2162947a42bc01b484d8a /scripts/gdb/linux/device.py | |
parent | 70fac8088cfad9f3b379c9082832b4d7532c16c2 (diff) |
s390/archrandom: add parameter check for s390_arch_random_generate
A review of the code showed, that this function which is exposed
within the whole kernel should do a parameter check for the
amount of bytes requested. If this requested bytes is too high
an unsigned int overflow could happen causing this function to
try to memcpy a really big memory chunk.
This is not a security issue as there are only two invocations
of this function from arch/s390/include/asm/archrandom.h and both
are not exposed to userland.
Reported-by: Sven Schnelle <svens@linux.ibm.com>
Signed-off-by: Harald Freudenberger <freude@linux.ibm.com>
Signed-off-by: Heiko Carstens <hca@linux.ibm.com>
Diffstat (limited to 'scripts/gdb/linux/device.py')
0 files changed, 0 insertions, 0 deletions