Skip to content

Conversation

@karthdmg-xilinx
Copy link
Collaborator

Problem solved by the commit
Fixed a critical integer overflow vulnerability in the AMD XRT kernel drivers when parsing XCLBIN headers.

Bug / issue (if any) fixed, which PR introduced the bug, how it was discovered
Vulnerability Type: CWE-190 (Integer Overflow) → CWE-122 (Heap Buffer Overflow)

How problem was solved, alternative solutions (if any) and why they were rejected
Added bounds validation for m_numSections before the vulnerable calculation

Risks (if any) associated the changes in the commit
None

What has been tested and how, request additional testing if necessary
Ran xrt validation test suite.

  • Attempt to load XCLBIN with:
    m_numSections = 0 → Should return -EINVAL
    m_numSections > 0x10000 → Should return -EINVAL

Documentation impact (if any)
None

@github-actions
Copy link
Contributor

clang-tidy review says "All clean, LGTM! 👍"

…ernel driverSWSPLAT-8849

Signed-off-by: karthik dmg <karthdmg@amd.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant