summaryrefslogtreecommitdiff
path: root/net/core
diff options
context:
space:
mode:
authorYuntao Wang <ytcoode@gmail.com>2022-04-30 16:08:03 +0300
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>2022-06-06 09:42:45 +0300
commit7f845de2863334bed4f362e95853f5e7bc323737 (patch)
tree866a50d0a9ead3538598029f5d50a4a47917ac8a /net/core
parent3097f38e91266c7132c3fdb7e778fac858c00670 (diff)
downloadlinux-7f845de2863334bed4f362e95853f5e7bc323737.tar.xz
bpf: Fix potential array overflow in bpf_trampoline_get_progs()
commit a2aa95b71c9bbec793b5c5fa50f0a80d882b3e8d upstream. The cnt value in the 'cnt >= BPF_MAX_TRAMP_PROGS' check does not include BPF_TRAMP_MODIFY_RETURN bpf programs, so the number of the attached BPF_TRAMP_MODIFY_RETURN bpf programs in a trampoline can exceed BPF_MAX_TRAMP_PROGS. When this happens, the assignment '*progs++ = aux->prog' in bpf_trampoline_get_progs() will cause progs array overflow as the progs field in the bpf_tramp_progs struct can only hold at most BPF_MAX_TRAMP_PROGS bpf programs. Fixes: 88fd9e5352fe ("bpf: Refactor trampoline update code") Signed-off-by: Yuntao Wang <ytcoode@gmail.com> Link: https://lore.kernel.org/r/20220430130803.210624-1-ytcoode@gmail.com Signed-off-by: Alexei Starovoitov <ast@kernel.org> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'net/core')
0 files changed, 0 insertions, 0 deletions