fa00c437ee
In aacraid's ioctl_send_fib() we do two fetches from userspace, one the
get the fib header's size and one for the fib itself. Later we use the
size field from the second fetch to further process the fib. If for some
reason the size from the second fetch is different than from the first
fix, we may encounter an out-of- bounds access in aac_fib_send(). We
also check the sender size to insure it is not out of bounds. This was
reported in https://bugzilla.kernel.org/show_bug.cgi?id=116751 and was
assigned CVE-2016-6480.
Reported-by: Pengfei Wang <wpengfeinudt@gmail.com>
Fixes:
|
||
---|---|---|
.. | ||
aachba.c | ||
aacraid.h | ||
commctrl.c | ||
comminit.c | ||
commsup.c | ||
dpcsup.c | ||
linit.c | ||
Makefile | ||
nark.c | ||
rkt.c | ||
rx.c | ||
sa.c | ||
src.c | ||
TODO |