From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 48E4E2E7F0A; Sat, 9 May 2026 07:18:17 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1778311097; cv=none; b=TQYvB9um68LULBi8UcpRkwUytdavyNqqySMvTydYZhs/jAYzMlW+gdrgI31GAeiKjeA34bMvRHQscUyoReseh6bHw5nQ02lzbfLXNdIYkAonPNu2YVGRTsevHi1F61YBOPCWB7C/N05ZjT6+svlq1/mW0ORFFdxwsYQeIDOxF8I= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1778311097; c=relaxed/simple; bh=CfaQizb78de1n+N5YUP8CfRQSYNCVrk0yL+FyZH0XzY=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=iUJC8RdznR1bc/bDpnYVdHNVk5NKHKF/qBjsi+kaL3Bp/4mBAOfzrqF1pYd1OcH74qpVdfB3CYSeIE1FZHlu+pX9jENnAisOXZcaFLtipHpFgLXKLWk2iw2cT1Yujf57pQayPPXpOX6xDMHZ0hX/HnUxrngd+c4oTGK8+J7bgqo= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b=jVHNbdKd; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b="jVHNbdKd" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 85978C2BCB2; Sat, 9 May 2026 07:18:16 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1778311096; bh=CfaQizb78de1n+N5YUP8CfRQSYNCVrk0yL+FyZH0XzY=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=jVHNbdKdUjeI8wvlqs43aFkdN8mVvVFMmfHgl+DtJGMWjPOINWJPPbDIZmCvk9ZHp W2Sv/PQu5n85y8qnVtb9EtQogv00BFiFuD+N+H108Lys/+VVDishN7OeJidbCY7MS8 3/ITJTdyFqCskwDEzdDbGvLgsWvUQXFFa9N0Zk6s= Date: Sat, 9 May 2026 09:17:33 +0200 From: "gregkh@linuxfoundation.org" To: =?utf-8?B?5pyo5Y+j55KD6Z+z?= Cc: linux-staging@lists.linux.dev, linux-kernel@vger.kernel.org, stable@vger.kernel.org, security@kernel.org Subject: Re: [PATCH] staging: vme_user: validate slave window size against buffer size Message-ID: <2026050919-gerbil-audience-3895@gregkh> References: Precedence: bulk X-Mailing-List: stable@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: On Sat, May 09, 2026 at 03:58:45PM +0900, 木口璃音 wrote: > diff --git a/drivers/staging/vme_user/vme_user.c > b/drivers/staging/vme_user/vme_user.c > index 11e25c2f6..41b8d5b51 100644 > --- a/drivers/staging/vme_user/vme_user.c > +++ b/drivers/staging/vme_user/vme_user.c > @@ -156,6 +156,11 @@ static ssize_t buffer_to_user(unsigned int minor, > char __user *buf, > { > void *image_ptr; > > + if (*ppos < 0 || (u64)*ppos >= image[minor].size_buf || > + count > image[minor].size_buf - (u64)*ppos) { > + pr_warn_ratelimited("%s: out-of-bounds access\n", __func__); > + return -EINVAL; > + } Also the patch is corrupted :(