Skip to content

Commit 9ae24af

Browse files
GustavoARSilvagregkh
authored andcommitted
usb: gadget: storage: Fix Spectre v1 vulnerability
num can be indirectly controlled by user-space, hence leading to a potential exploitation of the Spectre variant 1 vulnerability. This issue was detected with the help of Smatch: drivers/usb/gadget/function/f_mass_storage.c:3177 fsg_lun_make() warn: potential spectre issue 'fsg_opts->common->luns' [r] (local cap) Fix this by sanitizing num before using it to index fsg_opts->common->luns Notice that given that speculation windows are large, the policy is to kill the speculation on the first load and not worry if it can be completed with a dependent load/store [1]. [1] https://marc.info/?l=linux-kernel&m=152449131114778&w=2 Cc: stable@vger.kernel.org Signed-off-by: Gustavo A. R. Silva <gustavo@embeddedor.com> Acked-by: Felipe Balbi <felipe.balbi@intel.com> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
1 parent 665c365 commit 9ae24af

File tree

1 file changed

+3
-0
lines changed

1 file changed

+3
-0
lines changed

drivers/usb/gadget/function/f_mass_storage.c

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -221,6 +221,8 @@
221221
#include <linux/usb/gadget.h>
222222
#include <linux/usb/composite.h>
223223

224+
#include <linux/nospec.h>
225+
224226
#include "configfs.h"
225227

226228

@@ -3152,6 +3154,7 @@ static struct config_group *fsg_lun_make(struct config_group *group,
31523154
fsg_opts = to_fsg_opts(&group->cg_item);
31533155
if (num >= FSG_MAX_LUNS)
31543156
return ERR_PTR(-ERANGE);
3157+
num = array_index_nospec(num, FSG_MAX_LUNS);
31553158

31563159
mutex_lock(&fsg_opts->lock);
31573160
if (fsg_opts->refcnt || fsg_opts->common->luns[num]) {

0 commit comments

Comments
 (0)