diff options
author | Jeremy Boone <jeremy.boone@nccgroup.trust> | 2018-02-12 17:56:35 -0500 |
---|---|---|
committer | Tom Rini <trini@konsulko.com> | 2018-03-05 10:05:36 -0500 |
commit | 12e0ab327d1a6711ee40ac9ade2e189d1092e962 (patch) | |
tree | 5a7da278ab5236ee86d2947227bf0c8a86bf01f5 /drivers/tpm/tpm_tis_st33zp24_i2c.c | |
parent | 77bba970e2372b01156c66585db3d6fc751c7178 (diff) |
STMicro TPM: Fix potential buffer overruns
This patch prevents integer underflow when the length was too small,
which could lead to memory corruption.
Signed-off-by: Jeremy Boone <jeremy.boone@nccgroup.trust>
Diffstat (limited to 'drivers/tpm/tpm_tis_st33zp24_i2c.c')
-rw-r--r-- | drivers/tpm/tpm_tis_st33zp24_i2c.c | 5 |
1 files changed, 3 insertions, 2 deletions
diff --git a/drivers/tpm/tpm_tis_st33zp24_i2c.c b/drivers/tpm/tpm_tis_st33zp24_i2c.c index c8d01254d2..245218fc07 100644 --- a/drivers/tpm/tpm_tis_st33zp24_i2c.c +++ b/drivers/tpm/tpm_tis_st33zp24_i2c.c @@ -303,7 +303,8 @@ static int st33zp24_i2c_recv_data(struct udevice *dev, u8 *buf, size_t count) static int st33zp24_i2c_recv(struct udevice *dev, u8 *buf, size_t count) { struct tpm_chip *chip = dev_get_priv(dev); - int size, expected; + int size; + unsigned int expected; if (!chip) return -ENODEV; @@ -320,7 +321,7 @@ static int st33zp24_i2c_recv(struct udevice *dev, u8 *buf, size_t count) } expected = get_unaligned_be32(buf + 2); - if (expected > count) { + if (expected > count || expected < TPM_HEADER_SIZE) { size = -EIO; goto out; } |