]> git.karo-electronics.de Git - karo-tx-linux.git/commitdiff
KVM: Prevent overflow in KVM_GET_SUPPORTED_CPUID
authorAvi Kivity <avi@redhat.com>
Sun, 4 Oct 2009 14:45:13 +0000 (16:45 +0200)
committerGreg Kroah-Hartman <gregkh@suse.de>
Mon, 12 Oct 2009 19:40:17 +0000 (12:40 -0700)
commit 6a54435560efdab1a08f429a954df4d6c740bddf upstream.

The number of entries is multiplied by the entry size, which can
overflow on 32-bit hosts.  Bound the entry count instead.

Reported-by: David Wagner <daw@cs.berkeley.edu>
Signed-off-by: Avi Kivity <avi@redhat.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
arch/x86/kvm/x86.c

index 91a077fdc3a47ca8c90b53a9e6bf2bcc6fa51c00..8aafb62227e886f639a425749bb3dc7f8c33a87f 100644 (file)
@@ -1429,6 +1429,8 @@ static int kvm_dev_ioctl_get_supported_cpuid(struct kvm_cpuid2 *cpuid,
 
        if (cpuid->nent < 1)
                goto out;
+       if (cpuid->nent > KVM_MAX_CPUID_ENTRIES)
+               cpuid->nent = KVM_MAX_CPUID_ENTRIES;
        r = -ENOMEM;
        cpuid_entries = vmalloc(sizeof(struct kvm_cpuid_entry2) * cpuid->nent);
        if (!cpuid_entries)