linux-uconsole/drivers/android
Todd Kjos b14fd5b76a UPSTREAM: binder: check for overflow when alloc for security context
commit 0b0509508b upstream.

When allocating space in the target buffer for the security context,
make sure the extra_buffers_size doesn't overflow. This can only
happen if the given size is invalid, but an overflow can turn it
into a valid size. Fail the transaction if an overflow is detected.

Bug: 130571081
Change-Id: I03fa4c879895fe4f768d880f87dce329423bfb9a
Signed-off-by: Todd Kjos <tkjos@google.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2019-06-11 22:43:28 +00:00
..
binder.c UPSTREAM: binder: check for overflow when alloc for security context 2019-06-11 22:43:28 +00:00
binder_alloc.c This is the 4.19.38 stable release 2019-05-02 10:13:34 +02:00
binder_alloc.h BACKPORT: binder: use userspace pointer as base of buffer space 2019-03-25 15:08:18 -07:00
binder_alloc_selftest.c UPSTREAM: binder: fix sparse issue in binder_alloc_selftest.c 2019-03-25 15:08:19 -07:00
binder_trace.h BACKPORT: binder: use userspace pointer as base of buffer space 2019-03-25 15:08:18 -07:00
Kconfig android: binder: Drop dependency on !M68K 2018-07-07 17:44:52 +02:00
Makefile android: binder: Add allocator selftest 2017-08-28 16:47:17 +02:00