android_kernel_oneplus_msm8998/arch/x86/kernel/cpu/microcode
Quentin Casasnovas 35a9ff4eec x86/microcode/intel: Handle truncated microcode images more robustly
We do not check the input data bounds containing the microcode before
copying a struct microcode_intel_header from it. A specially crafted
microcode could cause the kernel to read invalid memory and lead to a
denial-of-service.

Signed-off-by: Quentin Casasnovas <quentin.casasnovas@oracle.com>
Cc: "H. Peter Anvin" <hpa@zytor.com>
Cc: Fenghua Yu <fenghua.yu@intel.com>
Link: http://lkml.kernel.org/r/1422964824-22056-3-git-send-email-quentin.casasnovas@oracle.com
[ Made error message differ from the next one and flipped comparison. ]
Signed-off-by: Borislav Petkov <bp@suse.de>
2015-02-19 12:42:23 +01:00
..
amd.c x86, microcode, AMD: Do not use smp_processor_id() in preemtible context 2014-12-01 11:51:05 +01:00
amd_early.c x86, microcode: Reload microcode on resume 2014-12-06 13:03:03 +01:00
core.c x86, microcode: Reload microcode on resume 2014-12-06 13:03:03 +01:00
core_early.c x86, microcode: Reload microcode on resume 2014-12-06 13:03:03 +01:00
intel.c x86/microcode/intel: Handle truncated microcode images more robustly 2015-02-19 12:42:23 +01:00
intel_early.c x86/microcode/intel: Handle truncated microcode images more robustly 2015-02-19 12:42:23 +01:00
intel_lib.c
Makefile