Dan Carpenter a0bcce2b2a tpm: Check for integer overflow in tpm2_map_response_body()
The "4 * be32_to_cpu(data->count)" multiplication can potentially
overflow which would lead to memory corruption.  Add a check for that.

Cc: stable@vger.kernel.org
Fixes: 745b361e989a ("tpm: infrastructure for TPM spaces")
Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
Reviewed-by: Jarkko Sakkinen <jarkko@kernel.org>
Signed-off-by: Jarkko Sakkinen <jarkko@kernel.org>
2021-10-26 05:03:33 +03:00
..
2021-10-22 09:08:08 -10:00
2021-10-17 17:17:28 -10:00
2021-09-01 08:44:42 -07:00
2021-10-17 19:25:20 -10:00
2021-10-17 17:17:28 -10:00
2021-09-07 12:38:59 -07:00
2021-09-09 11:48:27 -07:00
2021-09-09 11:39:57 -07:00
2021-09-08 11:50:26 -07:00
2021-09-09 11:07:47 -07:00
2021-10-17 17:30:49 -10:00
2021-10-22 10:31:32 -10:00
2021-10-17 17:10:00 -10:00
2021-10-08 11:57:54 -07:00
2021-09-01 08:44:42 -07:00
2021-09-07 12:38:59 -07:00
2021-10-08 11:57:54 -07:00
2021-10-21 06:44:53 -07:00
2021-10-14 09:07:14 -06:00
2021-10-16 09:00:46 -07:00
2021-09-20 12:43:34 +01:00
2021-09-01 15:25:28 -07:00
2021-10-01 14:45:23 -07:00
2021-09-01 08:44:42 -07:00
2021-10-17 17:17:28 -10:00
2021-09-01 10:29:29 -07:00
2021-10-17 17:06:31 -10:00
2021-10-15 15:04:02 +02:00
2021-10-17 18:17:19 -10:00
2021-10-08 12:55:23 -07:00
2021-08-14 15:54:09 -06:00