drm/amdgpu: fix out of bounds write
commit 5afa7898ab7a0ec9c28556a91df714bf3c2f725e upstream. Size can be any value and is user controlled resulting in overwriting the 40 byte array wr_buf with an arbitrary length of data from buf. Signed-off-by: Thelford Williams <tdwilliamsiv@gmail.com> Signed-off-by: Alex Deucher <alexander.deucher@amd.com> Cc: stable@vger.kernel.org Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
This commit is contained in:

committed by
Greg Kroah-Hartman

parent
c21b400221
commit
eb3b6805e3
@@ -264,7 +264,7 @@ static ssize_t dp_link_settings_write(struct file *f, const char __user *buf,
|
|||||||
if (!wr_buf)
|
if (!wr_buf)
|
||||||
return -ENOSPC;
|
return -ENOSPC;
|
||||||
|
|
||||||
if (parse_write_buffer_into_params(wr_buf, size,
|
if (parse_write_buffer_into_params(wr_buf, wr_buf_size,
|
||||||
(long *)param, buf,
|
(long *)param, buf,
|
||||||
max_param_num,
|
max_param_num,
|
||||||
¶m_nums)) {
|
¶m_nums)) {
|
||||||
|
Reference in New Issue
Block a user