x86/microcode/intel: Handle truncated microcode images more robustly
authorQuentin Casasnovas <quentin.casasnovas@oracle.com>
Tue, 3 Feb 2015 12:00:24 +0000 (13:00 +0100)
committerBorislav Petkov <bp@suse.de>
Thu, 19 Feb 2015 11:42:23 +0000 (12:42 +0100)
commit35a9ff4eec7a1725ac4364972fc6c156e4feedd0
treed77433b391eb3f7e9f85d46b720af0cd17be85f7
parentf84598bd7c851f8b0bf8cd0d7c3be0d73c432ff4
x86/microcode/intel: Handle truncated microcode images more robustly

We do not check the input data bounds containing the microcode before
copying a struct microcode_intel_header from it. A specially crafted
microcode could cause the kernel to read invalid memory and lead to a
denial-of-service.

Signed-off-by: Quentin Casasnovas <quentin.casasnovas@oracle.com>
Cc: "H. Peter Anvin" <hpa@zytor.com>
Cc: Fenghua Yu <fenghua.yu@intel.com>
Link: http://lkml.kernel.org/r/1422964824-22056-3-git-send-email-quentin.casasnovas@oracle.com
[ Made error message differ from the next one and flipped comparison. ]
Signed-off-by: Borislav Petkov <bp@suse.de>
arch/x86/kernel/cpu/microcode/intel.c
arch/x86/kernel/cpu/microcode/intel_early.c