Re: [PATCH 1/1] hisi_sas: Fix possible buffer overflows in prep_ssp_v3_hw

2020-12-08 Thread John Garry
On 08/12/2020 16:40, Xiaohui Zhang wrote: From: Zhang Xiaohui prep_ssp_v3_hw() calls memcpy() without checking the destination size may trigger a buffer overflower, which a local user could use to cause denial of service or the execution of arbitrary code. Fix it by putting the length check bef

[PATCH 1/1] hisi_sas: Fix possible buffer overflows in prep_ssp_v3_hw

2020-12-08 Thread Xiaohui Zhang
From: Zhang Xiaohui prep_ssp_v3_hw() calls memcpy() without checking the destination size may trigger a buffer overflower, which a local user could use to cause denial of service or the execution of arbitrary code. Fix it by putting the length check before calling memcpy(). Signed-off-by: Zhang