diff options
author | liucheng (G) <liucheng32@huawei.com> | 2019-08-29 13:47:40 +0000 |
---|---|---|
committer | Joe Hershberger <joe.hershberger@ni.com> | 2019-09-04 11:37:19 -0500 |
commit | 741a8a08ebe5bc3ccfe3cde6c2b44ee53891af21 (patch) | |
tree | 6a96ab7b87f7bcc3414c624bd8ced071d60e2fcc /net/nfs.c | |
parent | fe7288069d2e6659117049f7d27e261b550bb725 (diff) | |
download | u-boot-741a8a08ebe5bc3ccfe3cde6c2b44ee53891af21.tar.gz u-boot-741a8a08ebe5bc3ccfe3cde6c2b44ee53891af21.tar.bz2 u-boot-741a8a08ebe5bc3ccfe3cde6c2b44ee53891af21.zip |
CVE: nfs: fix stack-based buffer overflow in some nfs_handler reply helper functions
This patch adds a check to nfs_handler to fix buffer overflow for CVE-2019-14197,
CVE-2019-14200, CVE-2019-14201, CVE-2019-14202, CVE-2019-14203 and CVE-2019-14204.
Signed-off-by: Cheng Liu <liucheng32@huawei.com>
Reported-by: FermÃn Serna <fermin@semmle.com>
Acked-by: Joe Hershberger <joe.hershberger@ni.com>
Diffstat (limited to 'net/nfs.c')
-rw-r--r-- | net/nfs.c | 3 |
1 files changed, 3 insertions, 0 deletions
@@ -732,6 +732,9 @@ static void nfs_handler(uchar *pkt, unsigned dest, struct in_addr sip, debug("%s\n", __func__); + if (len > sizeof(struct rpc_t)) + return; + if (dest != nfs_our_port) return; |