s390/archrandom: add parameter check for s390_arch_random_generate
authorHarald Freudenberger <freude@linux.ibm.com>
Tue, 20 Apr 2021 06:23:12 +0000 (08:23 +0200)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Tue, 11 May 2021 12:47:31 +0000 (14:47 +0200)
commita32a2d831de09a0483b78a90a3ff291cfca61d59
tree0a2ff7b521a49f442fc76ecde785adb9ba71a4ee
parent338a8723022892399d67e4d3aeaa513ae25eed8e
s390/archrandom: add parameter check for s390_arch_random_generate

[ Upstream commit 28096067686c5a5cbd4c35b079749bd805df5010 ]

A review of the code showed, that this function which is exposed
within the whole kernel should do a parameter check for the
amount of bytes requested. If this requested bytes is too high
an unsigned int overflow could happen causing this function to
try to memcpy a really big memory chunk.

This is not a security issue as there are only two invocations
of this function from arch/s390/include/asm/archrandom.h and both
are not exposed to userland.

Reported-by: Sven Schnelle <svens@linux.ibm.com>
Signed-off-by: Harald Freudenberger <freude@linux.ibm.com>
Signed-off-by: Heiko Carstens <hca@linux.ibm.com>
Signed-off-by: Sasha Levin <sashal@kernel.org>
arch/s390/crypto/arch_random.c