[SRU] [Trusty] [PATCH 0/1] openvswitch: fix kernel buffer overflow

Andrea Righi andrea.righi at canonical.com
Tue Apr 9 10:28:08 UTC 2019


Buglink: https://bugs.launchpad.net/bugs/1813244

[Impact]

 * Flow action buffer can be incorrectly resized to contain the newly added
   action entries: the buffer is always resized multiplying the previous size
   by 2, but this might be not enough if the requested size is bigger than
   previous_size*2, causing a buffer overflow

 * The fix correctly resizes the buffer to prevent the buffer overflow
   and potential memory corruptions

 * This bug can be triggered potentially on any architecture, but it is very
   likely to happen on i386 running the following test case

[Test Case]

 * run this openvswitch test case:
   https://launchpadlibrarian.net/416589265/lp1262692

[Fix]

 * Instead of resizing the buffer by a factor of 2, use
   max(current_size * 2, current_size + requested_size)

[Regression Potential]

 * Fix has been tested on the affected platform and verified using slub_debug.
   It is an upstream fix and also a very small patch (one-liner basically), so
   backport changes are minimal.

Andrea Righi (1):
 openvswitch: fix flow actions reallocation

 net/openvswitch/flow_netlink.c |    4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)




More information about the kernel-team mailing list