On Mon, 6 Jul 2020 12:09:28 -0400, Andres Beltran wrote:

> For additional robustness in the face of Hyper-V errors or malicious
> behavior, validate all values that originate from packets that
> Hyper-V has sent to the guest. Ensure that invalid values cannot
> cause data being copied out of the bounds of the source buffer
> when calling memcpy. Ensure that outgoing packets do not have any
> leftover guest memory that has not been zeroed out.

Applied to 5.9/scsi-queue, thanks!

[1/1] scsi: storvsc: Add validation for untrusted Hyper-V values
      https://git.kernel.org/mkp/scsi/c/0a76566595bf

-- 
Martin K. Petersen      Oracle Linux Engineering

Reply via email to