diff options
author | kp <kp@FreeBSD.org> | 2016-03-03 07:16:35 +0000 |
---|---|---|
committer | kp <kp@FreeBSD.org> | 2016-03-03 07:16:35 +0000 |
commit | 2667c3d5fbaef4a37daa33b9e899e7bd2070cf31 (patch) | |
tree | 993486756a17a71cc48b355cf2c837af7e10ecfb /contrib/llvm/lib/CodeGen/RegAllocBasic.cpp | |
parent | 73af9669cdc04af0c06344ce6f0d85808187eab3 (diff) | |
download | FreeBSD-src-2667c3d5fbaef4a37daa33b9e899e7bd2070cf31.zip FreeBSD-src-2667c3d5fbaef4a37daa33b9e899e7bd2070cf31.tar.gz |
MFC: r296025:
pf: Fix possible out-of-bounds write
In the DIOCRSETADDRS ioctl() handler we allocate a table for struct pfr_addrs,
which is processed in pfr_set_addrs(). At the users request we also provide
feedback on the deleted addresses, by storing them after the new list
('bcopy(&ad, addr + size + i, sizeof(ad));' in pfr_set_addrs()).
This means we write outside the bounds of the buffer we've just allocated.
We need to look at pfrio_size2 instead (i.e. the size the user reserved for our
feedback). That'd allow a malicious user to specify a smaller pfrio_size2 than
pfrio_size though, in which case we'd still read outside of the allocated
buffer. Instead we allocate the largest of the two values.
Reported By: Paul J Murphy <paul@inetstat.net>
PR: 207463
Approved by: re (marius)
Diffstat (limited to 'contrib/llvm/lib/CodeGen/RegAllocBasic.cpp')
0 files changed, 0 insertions, 0 deletions