Received: by 2002:a25:6193:0:0:0:0:0 with SMTP id v141csp1510994ybb; Sat, 11 Apr 2020 05:18:37 -0700 (PDT) X-Google-Smtp-Source: APiQypI3R7t+SH18iBAOwaeKG9XOoYNQ0wnvv7GWw1G7fXhLFuVN+rZsPaw+Px5csgVs/FPNvJ2A X-Received: by 2002:a37:8741:: with SMTP id j62mr7785258qkd.441.1586607517597; Sat, 11 Apr 2020 05:18:37 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1586607517; cv=none; d=google.com; s=arc-20160816; b=r0Kvn7yGAcvibx/MMOtFHj3G/ZRAXsxV63FzZaIAX7RZT4jWPiNCcYW5lqu6ddU6yO wyohUFUrH03cRUVpHAuZQKDO+agpmb/4cCyAhLUwG/ojE7PA8Be6zlURYLK8t9oBUWje 9qtWRKWEbDhoDbo7OMBiWWRvmpFOX1qe9sqOL1J3lQbvRUkZaqfKv9hPpsuGX/YyIg+9 r6TgUuVApoctLbgZd8EKQoOVGKjy3eMHnkEOiJm1Ya8dYUNdLWP5Fk8HTEe1uJpCAbi0 HwwHQ0LKlZkRW27lczcYDqfRVgMFw7+EW/kb5TQIUNLw3p9IYivVHigcWdVww7/OAIsL TK9w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=jdVZJgbgQwsOPYKRLxfzfqgRckHKZoJTEDVxMXJg96M=; b=UF76e4bJcv3lxIge+FWB+EzScE4SWnkNnnRfG+w8IsiyC2C1MET62XtXdHG3l3U50f DOi4Hr1LqoqGrL9rdXygVMHK8lBdnq69YaZsNHOzBWd/qTkQzAyR9Vd4v0PBwn4YKCmd tphXpVo99wlH7i5j0DE+r3YmMy5M7xGDDKUJ3FMzemrVGpCAoVIbOIv8S2vlhUi1PkOo nIxuW0a4ZY76+vFUXTrbpYo0kDv9cIofg0QUon3d/5JGNv6oZu3AwqbxpT9Bwe6I9I3Y bHpmFFSNGKqQxQ/pzzKaI/qLrWPQVD2AR2UfycFj3rjdkZ9/2tqMNsDIZcqSxeYWE+Zi FYtg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=RAoNy7kQ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o4si2674379qvx.216.2020.04.11.05.18.23; Sat, 11 Apr 2020 05:18:37 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=RAoNy7kQ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728150AbgDKMPi (ORCPT + 99 others); Sat, 11 Apr 2020 08:15:38 -0400 Received: from mail.kernel.org ([198.145.29.99]:49590 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728121AbgDKMPh (ORCPT ); Sat, 11 Apr 2020 08:15:37 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id A88C020644; Sat, 11 Apr 2020 12:15:36 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1586607337; bh=GDBkdFyQwNJy3s7hikLvymUoDDGW7i4bveuG7EFg1oA=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=RAoNy7kQ3vIl7pO8qEiQt0rezIPfKGBgLNDH9vRo5kvhjrG6FbQW3lGRMYWCItZCN 092lpeSkQ8G9yuD+lFzO/im9PMwBQDAFTq3fPoLuz16+1z6m27Xay5x6nHlao/FG8S 5ijyIYI+ycnKBctWkvWgBkI0IXJbQOgP4BIDIEOY= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Richard Palethorpe , Kees Cook , linux-can@vger.kernel.org, netdev@vger.kernel.org, security@kernel.org, wg@grandegger.com, mkl@pengutronix.de, davem@davemloft.net Subject: [PATCH 4.19 33/54] slcan: Dont transmit uninitialized stack data in padding Date: Sat, 11 Apr 2020 14:09:15 +0200 Message-Id: <20200411115511.772234226@linuxfoundation.org> X-Mailer: git-send-email 2.26.0 In-Reply-To: <20200411115508.284500414@linuxfoundation.org> References: <20200411115508.284500414@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Richard Palethorpe [ Upstream commit b9258a2cece4ec1f020715fe3554bc2e360f6264 ] struct can_frame contains some padding which is not explicitly zeroed in slc_bump. This uninitialized data will then be transmitted if the stack initialization hardening feature is not enabled (CONFIG_INIT_STACK_ALL). This commit just zeroes the whole struct including the padding. Signed-off-by: Richard Palethorpe Fixes: a1044e36e457 ("can: add slcan driver for serial/USB-serial CAN adapters") Reviewed-by: Kees Cook Cc: linux-can@vger.kernel.org Cc: netdev@vger.kernel.org Cc: security@kernel.org Cc: wg@grandegger.com Cc: mkl@pengutronix.de Cc: davem@davemloft.net Acked-by: Marc Kleine-Budde Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- drivers/net/can/slcan.c | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) --- a/drivers/net/can/slcan.c +++ b/drivers/net/can/slcan.c @@ -147,7 +147,7 @@ static void slc_bump(struct slcan *sl) u32 tmpid; char *cmd = sl->rbuff; - cf.can_id = 0; + memset(&cf, 0, sizeof(cf)); switch (*cmd) { case 'r': @@ -186,8 +186,6 @@ static void slc_bump(struct slcan *sl) else return; - *(u64 *) (&cf.data) = 0; /* clear payload */ - /* RTR frames may have a dlc > 0 but they never have any data bytes */ if (!(cf.can_id & CAN_RTR_FLAG)) { for (i = 0; i < cf.can_dlc; i++) {