Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp443509ybl; Tue, 28 Jan 2020 06:06:04 -0800 (PST) X-Google-Smtp-Source: APXvYqxQPJJ7vHpQ6vcRB9WwOwYqNIjr51FOduXkmWoXaMrDAle36V4+QSrhGKSHTQtQdvD6++ga X-Received: by 2002:a05:6830:22e2:: with SMTP id t2mr16812231otc.129.1580220364358; Tue, 28 Jan 2020 06:06:04 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1580220364; cv=none; d=google.com; s=arc-20160816; b=wZDHjzrLvF6TIxQiS9m7MO2lUt+Ci8BJ2WgQMrlj7l7MaTXW8A34VNXMiCRVuPHRXN G3cgUePYlW1cry/rZTSfFvMvuvXIeo+bVJPjvvvSE27UGwdYHYTVc0dtyxXBnuUIpoGQ wf/1ojdGbdt1cXCZd8p0USqt0KkWh3RgIlw0jTMh+6LmqFk7rShkKZ2spv08+eMa5RIL /1aCXpTRtmQgCC/3X8VlnsRCoe9y3pZrhL+Q4nWwvr7W4brPOm/U1OPVWuNyEbr8lm/x C3PVtBOM34SBA8eLnjv7xjgTTg4TdCfsk5uW4Q3H+lUFm3g4wcPBk+qUYSFNCNYBxx2l EEnQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=f6WRQyew8fCqLc7JwmhteSZU8pPzTlfXIDkj2Q1lta4=; b=wdzO53ZYYThM8nmJyBaTo7lB7XjVofnnEUIybf/U0LiWdF36rR/QDH0SI3QWhgGEep tZs0OWXlSTvUMh48DZGwkulzH/CQgI3qTdimQG6FmMFo6ayBZDVsxj9glM/wUcYdZEn4 z9PfsSU9CXo16RBt9w1gQL4Zh3+gXxpnBpOSEzCLWz22bnF9o06gZcHFXWPuv8vjpl42 1DqU3s4zgcN8EJqdTaFK4eYWTqKaKr1pIBKfEfeCEIxkOqhDOR2YLkK7zwPtlaiRqniA RzFJ+8E5wK0uQPL2/6HKVJ+7lYbN0K0SuBtyY7GkZVmutzVeZkfbPqvPsj261EfPs9CK 9RYQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=LItxagg8; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d83si2967493oib.166.2020.01.28.06.05.42; Tue, 28 Jan 2020 06:06:04 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=LItxagg8; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727518AbgA1OBt (ORCPT + 99 others); Tue, 28 Jan 2020 09:01:49 -0500 Received: from mail.kernel.org ([198.145.29.99]:47890 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727495AbgA1OBp (ORCPT ); Tue, 28 Jan 2020 09:01:45 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 1EC2C24685; Tue, 28 Jan 2020 14:01:43 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1580220104; bh=XKIqmR/yOlhzJCX0lIwbHQgrpdZT0G1ZKeUb032zTCw=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=LItxagg8vnpwYfuV5hqjCBfAe4wEBQJrIil3SKpWZzjMOg1npS/QcWubQY/yx29r4 zvTsgtKhrSVXjOp690zq5BTrL8T4EkLvveGDV7IhYj8k8533jYWTkETJKiMZ3B6vqK 0rQPlWjl6lWxuBUBkS35J9P1XSWg77M0lxAo8Btk= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Ilja Van Sprundel , Michael Ellerman , "David S. Miller" Subject: [PATCH 5.4 019/104] airo: Fix possible info leak in AIROOLDIOCTL/SIOCDEVPRIVATE Date: Tue, 28 Jan 2020 14:59:40 +0100 Message-Id: <20200128135819.899539624@linuxfoundation.org> X-Mailer: git-send-email 2.25.0 In-Reply-To: <20200128135817.238524998@linuxfoundation.org> References: <20200128135817.238524998@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Michael Ellerman [ Upstream commit d6bce2137f5d6bb1093e96d2f801479099b28094 ] The driver for Cisco Aironet 4500 and 4800 series cards (airo.c), implements AIROOLDIOCTL/SIOCDEVPRIVATE in airo_ioctl(). The ioctl handler copies an aironet_ioctl struct from userspace, which includes a command and a length. Some of the commands are handled in readrids(), which kmalloc()'s a buffer of RIDSIZE (2048) bytes. That buffer is then passed to PC4500_readrid(), which has two cases. The else case does some setup and then reads up to RIDSIZE bytes from the hardware into the kmalloc()'ed buffer. Here len == RIDSIZE, pBuf is the kmalloc()'ed buffer: // read the rid length field bap_read(ai, pBuf, 2, BAP1); // length for remaining part of rid len = min(len, (int)le16_to_cpu(*(__le16*)pBuf)) - 2; ... // read remainder of the rid rc = bap_read(ai, ((__le16*)pBuf)+1, len, BAP1); PC4500_readrid() then returns to readrids() which does: len = comp->len; if (copy_to_user(comp->data, iobuf, min(len, (int)RIDSIZE))) { Where comp->len is the user controlled length field. So if the "rid length field" returned by the hardware is < 2048, and the user requests 2048 bytes in comp->len, we will leak the previous contents of the kmalloc()'ed buffer to userspace. Fix it by kzalloc()'ing the buffer. Found by Ilja by code inspection, not tested as I don't have the required hardware. Reported-by: Ilja Van Sprundel Signed-off-by: Michael Ellerman Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- drivers/net/wireless/cisco/airo.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/drivers/net/wireless/cisco/airo.c +++ b/drivers/net/wireless/cisco/airo.c @@ -7813,7 +7813,7 @@ static int readrids(struct net_device *d return -EINVAL; } - if ((iobuf = kmalloc(RIDSIZE, GFP_KERNEL)) == NULL) + if ((iobuf = kzalloc(RIDSIZE, GFP_KERNEL)) == NULL) return -ENOMEM; PC4500_readrid(ai,ridcode,iobuf,RIDSIZE, 1);