]> git.ipfire.org Git - thirdparty/kernel/stable.git/commitdiff
netdevsim: prevent bad user input in nsim_dev_health_break_write()
authorEric Dumazet <edumazet@google.com>
Fri, 13 Dec 2024 17:25:18 +0000 (17:25 +0000)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Fri, 27 Dec 2024 12:52:54 +0000 (13:52 +0100)
[ Upstream commit ee76746387f6233bdfa93d7406990f923641568f ]

If either a zero count or a large one is provided, kernel can crash.

Fixes: 82c93a87bf8b ("netdevsim: implement couple of testing devlink health reporters")
Reported-by: syzbot+ea40e4294e58b0292f74@syzkaller.appspotmail.com
Closes: https://lore.kernel.org/netdev/675c6862.050a0220.37aaf.00b1.GAE@google.com/T/#u
Signed-off-by: Eric Dumazet <edumazet@google.com>
Cc: Jiri Pirko <jiri@nvidia.com>
Reviewed-by: Joe Damato <jdamato@fastly.com>
Link: https://patch.msgid.link/20241213172518.2415666-1-edumazet@google.com
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
Signed-off-by: Sasha Levin <sashal@kernel.org>
drivers/net/netdevsim/health.c

index aa77af4a68df6fc60a3ce9c081fc98c60df65158..bc44462c70e264548d08f7be579be62d86ba2689 100644 (file)
@@ -203,6 +203,8 @@ static ssize_t nsim_dev_health_break_write(struct file *file,
        char *break_msg;
        int err;
 
+       if (count == 0 || count > PAGE_SIZE)
+               return -EINVAL;
        break_msg = memdup_user_nul(data, count);
        if (IS_ERR(break_msg))
                return PTR_ERR(break_msg);