]> git.ipfire.org Git - thirdparty/kernel/stable.git/commitdiff
iommu/amd: Avoid stack buffer overflow from kernel cmdline
authorKees Cook <kees@kernel.org>
Mon, 4 Aug 2025 15:40:27 +0000 (08:40 -0700)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Thu, 28 Aug 2025 14:31:13 +0000 (16:31 +0200)
[ Upstream commit 8503d0fcb1086a7cfe26df67ca4bd9bd9e99bdec ]

While the kernel command line is considered trusted in most environments,
avoid writing 1 byte past the end of "acpiid" if the "str" argument is
maximum length.

Reported-by: Simcha Kosman <simcha.kosman@cyberark.com>
Closes: https://lore.kernel.org/all/AS8P193MB2271C4B24BCEDA31830F37AE84A52@AS8P193MB2271.EURP193.PROD.OUTLOOK.COM
Fixes: b6b26d86c61c ("iommu/amd: Add a length limitation for the ivrs_acpihid command-line parameter")
Signed-off-by: Kees Cook <kees@kernel.org>
Reviewed-by: Ankit Soni <Ankit.Soni@amd.com>
Link: https://lore.kernel.org/r/20250804154023.work.970-kees@kernel.org
Signed-off-by: Joerg Roedel <joerg.roedel@amd.com>
Signed-off-by: Sasha Levin <sashal@kernel.org>
drivers/iommu/amd/init.c

index ff11cd7e5c068c9cedc9ed1f773dc75050c4e7ac..f5b544e0f230bc1c976924b406df4c24391d3c41 100644 (file)
@@ -3598,7 +3598,7 @@ static int __init parse_ivrs_acpihid(char *str)
 {
        u32 seg = 0, bus, dev, fn;
        char *hid, *uid, *p, *addr;
-       char acpiid[ACPIID_LEN] = {0};
+       char acpiid[ACPIID_LEN + 1] = { }; /* size with NULL terminator */
        int i;
 
        addr = strchr(str, '@');
@@ -3624,7 +3624,7 @@ static int __init parse_ivrs_acpihid(char *str)
        /* We have the '@', make it the terminator to get just the acpiid */
        *addr++ = 0;
 
-       if (strlen(str) > ACPIID_LEN + 1)
+       if (strlen(str) > ACPIID_LEN)
                goto not_found;
 
        if (sscanf(str, "=%s", acpiid) != 1)