Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp255001ybi; Wed, 29 May 2019 20:45:02 -0700 (PDT) X-Google-Smtp-Source: APXvYqx/LhmiDBS1cv35In7nFJZic8SUXzDXNehquOSZgf0Y2meoss40il6Aviq8sOLy7HUcrz2t X-Received: by 2002:aa7:92da:: with SMTP id k26mr1599194pfa.70.1559187902239; Wed, 29 May 2019 20:45:02 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1559187902; cv=none; d=google.com; s=arc-20160816; b=cu/up6fXjv08rL/8PjQwyiJ466nlaD+eoKpnpRkkDjvCCnU3KaObiMpxYsvlmDHpZc oqODwpXVZZvsXvQdnxqb7XvumR0q/IQT0XdU01N7YlXvQXEQBab93iLmsh2EgcuH911+ 1DgaXRVmJMSdanTWqjrNV5SyPh/opWgVUrL/r+VulFKEgpJs4wc5vuPVfhyR1M/DWXZA ZEbOUa6JEadBm5csSqdxvUJA0mOhulNevlvfcSSEY3q6plVLa3QDjDw1NOH6OS0VhKyO YB7Nz3uIS1FvS2QRy/Rkm9ECv+YNn3mqkaa/4Se8czgB1RnswrYlsRo75gj6DjhuFgvm RFBw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=XRcr4NSC+NdnJurb9s8TdGPh6SgSC5GiOsraMlOpzoI=; b=xW6t3Uk8rivx+xSD4saIil3WYZ+UFFZQwV4o0rNoiSXcDKwZJc7FsnxW54uqEYAh1T mmmUAxnAhwIcCqmCiftdf1+EjqxL72efdbyZecnAsNjY+YXP70nJ/Vj0X9Hj/d78Pvoc Zz6vp5yYUxSxOifWhLg/qRHSqqaFa7WsUXQI8Nugolh9MOI6GcGu6fzH6iZ6n/KZp3Zp ASH40AYGv6qqshoXS0lGJkHlO4FlnCIq+mxHjlCc8IYGGENpybm5EOJqme6txwZPOu4+ KOITF2dShIn6UCXHg5jGTPpr8zZhG1QBEb8tDBF6NfzGui78cS2Rj2V9ESX358CdNfm3 01Bw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ZW+7SGMo; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e6si1912601pgj.590.2019.05.29.20.44.45; Wed, 29 May 2019 20:45:02 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ZW+7SGMo; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732855AbfE3Dna (ORCPT + 99 others); Wed, 29 May 2019 23:43:30 -0400 Received: from mail.kernel.org ([198.145.29.99]:33182 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732469AbfE3DVI (ORCPT ); Wed, 29 May 2019 23:21:08 -0400 Received: from localhost (ip67-88-213-2.z213-88-67.customer.algx.net [67.88.213.2]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 3A711249A9; Thu, 30 May 2019 03:21:08 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1559186468; bh=bppTzBxoO9Ue7WR8F4rWlFuDGJvLkjrVlQGw2T/vVjs=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=ZW+7SGMosHbrqzOdj/ZS3WUGfPt464BY71E+5/AW1nvUDYA3zY+CrF0jFtJ7agIJF hSwcXIJJJb9nxVOnZsPTnlhH7FinFad8FzYF4olKYUHrZ/fokuIWIgoS8CNTJGb1Oi kINirgvbvBd2zc3iYDVyp3030pWrlIooTTTIW8Sw= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Kangjie Lu , Arend van Spriel , Kalle Valo , Sasha Levin Subject: [PATCH 4.9 094/128] brcmfmac: fix missing checks for kmemdup Date: Wed, 29 May 2019 20:07:06 -0700 Message-Id: <20190530030451.578660109@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190530030432.977908967@linuxfoundation.org> References: <20190530030432.977908967@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org [ Upstream commit 46953f97224d56a12ccbe9c6acaa84ca0dab2780 ] In case kmemdup fails, the fix sets conn_info->req_ie_len and conn_info->resp_ie_len to zero to avoid buffer overflows. Signed-off-by: Kangjie Lu Acked-by: Arend van Spriel Signed-off-by: Kalle Valo Signed-off-by: Sasha Levin --- drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c b/drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c index 530f521209728..8f8fe6f2af5b0 100644 --- a/drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c +++ b/drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c @@ -5374,6 +5374,8 @@ static s32 brcmf_get_assoc_ies(struct brcmf_cfg80211_info *cfg, conn_info->req_ie = kmemdup(cfg->extra_buf, conn_info->req_ie_len, GFP_KERNEL); + if (!conn_info->req_ie) + conn_info->req_ie_len = 0; } else { conn_info->req_ie_len = 0; conn_info->req_ie = NULL; @@ -5390,6 +5392,8 @@ static s32 brcmf_get_assoc_ies(struct brcmf_cfg80211_info *cfg, conn_info->resp_ie = kmemdup(cfg->extra_buf, conn_info->resp_ie_len, GFP_KERNEL); + if (!conn_info->resp_ie) + conn_info->resp_ie_len = 0; } else { conn_info->resp_ie_len = 0; conn_info->resp_ie = NULL; -- 2.20.1