diff options
author | 2021-04-20 08:23:12 +0200 | |
---|---|---|
committer | 2021-04-21 12:32:12 +0200 | |
commit | 28096067686c5a5cbd4c35b079749bd805df5010 (patch) | |
tree | 3ad7f13a743e387d6fa2162947a42bc01b484d8a /tools/perf/scripts/python/export-to-sqlite.py | |
parent | s390/zcrypt: fix zcard and zqueue hot-unplug memleak (diff) | |
download | wireguard-linux-28096067686c5a5cbd4c35b079749bd805df5010.tar.xz wireguard-linux-28096067686c5a5cbd4c35b079749bd805df5010.zip |
s390/archrandom: add parameter check for s390_arch_random_generate
A review of the code showed, that this function which is exposed
within the whole kernel should do a parameter check for the
amount of bytes requested. If this requested bytes is too high
an unsigned int overflow could happen causing this function to
try to memcpy a really big memory chunk.
This is not a security issue as there are only two invocations
of this function from arch/s390/include/asm/archrandom.h and both
are not exposed to userland.
Reported-by: Sven Schnelle <svens@linux.ibm.com>
Signed-off-by: Harald Freudenberger <freude@linux.ibm.com>
Signed-off-by: Heiko Carstens <hca@linux.ibm.com>
Diffstat (limited to 'tools/perf/scripts/python/export-to-sqlite.py')
0 files changed, 0 insertions, 0 deletions