]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/commit
udf: prevent speculative execution
authorElena Reshetova <elena.reshetova@intel.com>
Wed, 13 Dec 2017 08:15:30 +0000 (10:15 +0200)
committerKleber Sacilotto de Souza <kleber.souza@canonical.com>
Mon, 5 Feb 2018 15:56:05 +0000 (16:56 +0100)
commitce8861e5b4e7c92adf9afbbddb99af9834638fc9
tree7ec23be880d277d53a92fd095f65771738c34f02
parent3b2ec7ebd4f8a6bc64567b8096915a1f14e8b133
udf: prevent speculative execution

CVE-2017-5753 (Spectre v1 Intel)

Since the eahd->appAttrLocation value in function
udf_add_extendedattr() seems to be controllable by
userspace and later on conditionally (upon bound check)
used in following memmove, insert an observable speculation
barrier before its usage. This should prevent
observable speculation on that branch and avoid
kernel memory leak.

Signed-off-by: Elena Reshetova <elena.reshetova@intel.com>
Signed-off-by: Andy Whitcroft <apw@canonical.com>
Signed-off-by: Kleber Sacilotto de Souza <kleber.souza@canonical.com>
fs/udf/misc.c