Received: by 2002:a25:c205:0:0:0:0:0 with SMTP id s5csp1137817ybf; Thu, 27 Feb 2020 05:45:03 -0800 (PST) X-Google-Smtp-Source: APXvYqzEGZ1Um+TVsKgW7soZwGE25Zmdm0FbmUmHRP3FfDCfK64q0AX29scD5wKn+KE0r+9+dw5M X-Received: by 2002:a9d:674f:: with SMTP id w15mr3364794otm.243.1582811102936; Thu, 27 Feb 2020 05:45:02 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1582811102; cv=none; d=google.com; s=arc-20160816; b=iyqL9zuFnVUHGMJNbnhIJeI1cRXdxR9dlYWY3Bc68XNX1JK/xvDUQpzOufd2FOFUsl qJhaSuB9oBdlGjZu9u6qQF73yPbcPMW3kqOSoblqYFzquZ3ZOsiWhgzGakSX22nDo3rT quqCCn62Oo8qhfP6qHBfLy86p0j/5FXKRTT2H7bMjN76L+AR1LjIcr7S0mrLBkD1/LO4 yfoQH/Z9Lg/k/nFz/c/qUvbEJLeJpnSTWWkzTg1c8M/5tjWCE7aTBo/3GSyx3wNwJoIW vUt9AHx/ShetPlH4iZ7N+67CRTZi8VjSVN3b6aS6GkOyLA5TvGTu3bBAmIRTfdhMjgem xOkQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=4oOwY/JeR36pPjxAssxSCv0ZInfx41WFcBcsMrDl3oQ=; b=OLO+z+p8GaeiwN8xgv5xae9iF58u4VxQ5MTOpoBQGELJFx084NIb9p2fs+6dG1X+f/ Npvs2kdehf6CL51K6wBWRN8Omd1Q5DaBRUncptf7VHVAwb6apkiLUjGyX1H1XVmhIrfL NkcBlswA/08Vtqd8Apb7AtQhljJXO/efo2pIATaG2Huo1h97OMK474buJ7jZ9d4fX6V4 dcOD5BB9OfXRawqfUNs+kR7aI0FsUj6755LfiLxTMhmJvMzPiax4AyKgmyq6UApN+diC RpxLRaNrCrBvShPmF8zSQeMbHOyzUtVi8aZdhug0f0a7FukvfPlymodwbOAhLQriGV7z a9dQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=u0U+iqJG; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d26si1446796otc.6.2020.02.27.05.44.50; Thu, 27 Feb 2020 05:45:02 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=u0U+iqJG; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729714AbgB0NoB (ORCPT + 99 others); Thu, 27 Feb 2020 08:44:01 -0500 Received: from mail.kernel.org ([198.145.29.99]:39376 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729591AbgB0NoA (ORCPT ); Thu, 27 Feb 2020 08:44:00 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 0183C20726; Thu, 27 Feb 2020 13:43:58 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1582811039; bh=vKMWUGzAoBSJssGD/lNWiThFdqknKjAGO2lhp3M16mE=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=u0U+iqJGfdqWJYYW5GJ7oFD7cqFXF0WWd+5bZ7zkoXo0636VkmGL5p+67/5GLBFvw 8vWBqEer57xai+pwPj48HrPe8WQduZc7oZnQXqoi5HPfGpGmYNbB1QGnLgjrLAgCjq 2FSCCYSAcPaJLlyEIyq3ubXVgclCJzAyq9K+NBy4= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Pietro Oliva , Larry Finger Subject: [PATCH 4.4 092/113] staging: rtl8188eu: Fix potential overuse of kernel memory Date: Thu, 27 Feb 2020 14:36:48 +0100 Message-Id: <20200227132226.465499280@linuxfoundation.org> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20200227132211.791484803@linuxfoundation.org> References: <20200227132211.791484803@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Larry Finger commit 4ddf8ab8d15ddbc52eefb44eb64e38466ce1f70f upstream. In routine wpa_supplicant_ioctl(), the user-controlled p->length is checked to be at least the size of struct ieee_param size, but the code does not detect the case where p->length is greater than the size of the struct, thus a malicious user could be wasting kernel memory. Fixes commit a2c60d42d97c ("Add files for new driver - part 16"). Reported by: Pietro Oliva Cc: Pietro Oliva Cc: Stable Fixes commit a2c60d42d97c ("Add files for new driver - part 16"). Signed-off-by: Larry Finger Link: https://lore.kernel.org/r/20200210180235.21691-4-Larry.Finger@lwfinger.net Signed-off-by: Greg Kroah-Hartman --- drivers/staging/rtl8188eu/os_dep/ioctl_linux.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/drivers/staging/rtl8188eu/os_dep/ioctl_linux.c +++ b/drivers/staging/rtl8188eu/os_dep/ioctl_linux.c @@ -2054,7 +2054,7 @@ static int wpa_supplicant_ioctl(struct n struct ieee_param *param; uint ret = 0; - if (p->length < sizeof(struct ieee_param) || !p->pointer) { + if (!p->pointer || p->length != sizeof(struct ieee_param)) { ret = -EINVAL; goto out; }