]> git.ipfire.org Git - thirdparty/kernel/stable.git/commit
firmware: google: check if size is valid when decoding VPD data
authorHung-Te Lin <hungte@chromium.org>
Fri, 30 Aug 2019 02:23:58 +0000 (10:23 +0800)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Sat, 21 Sep 2019 05:18:14 +0000 (07:18 +0200)
commit3049e5125169f4a59a7296fc75b639789a8f5c94
tree3c0e18306305aea4cda6bff21557e2ab0d455890
parentad0ef1b06e7bd834060f62a4c24f5b88f714b01b
firmware: google: check if size is valid when decoding VPD data

commit 4b708b7b1a2c09fbdfff6b942ebe3a160213aacd upstream.

The VPD implementation from Chromium Vital Product Data project used to
parse data from untrusted input without checking if the meta data is
invalid or corrupted. For example, the size from decoded content may
be negative value, or larger than whole input buffer. Such invalid data
may cause buffer overflow.

To fix that, the size parameters passed to vpd_decode functions should
be changed to unsigned integer (u32) type, and the parsing of entry
header should be refactored so every size field is correctly verified
before starting to decode.

Fixes: ad2ac9d5c5e0 ("firmware: Google VPD: import lib_vpd source files")
Signed-off-by: Hung-Te Lin <hungte@chromium.org>
Cc: stable <stable@vger.kernel.org>
Reviewed-by: Guenter Roeck <linux@roeck-us.net>
Reviewed-by: Stephen Boyd <swboyd@chromium.org>
Link: https://lore.kernel.org/r/20190830022402.214442-1-hungte@chromium.org
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
drivers/firmware/google/vpd.c
drivers/firmware/google/vpd_decode.c
drivers/firmware/google/vpd_decode.h