Received: by 2002:a25:6193:0:0:0:0:0 with SMTP id v141csp1516753ybb; Sat, 11 Apr 2020 05:26:48 -0700 (PDT) X-Google-Smtp-Source: APiQypLpuJl7wYCvkKvsp8VfrJ0OUWNuuddjsUOgMQDJi2dchMsd+8yytXpweD2SgTPG6MCNwbwH X-Received: by 2002:a37:4e0a:: with SMTP id c10mr4702929qkb.242.1586608008389; Sat, 11 Apr 2020 05:26:48 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1586608008; cv=none; d=google.com; s=arc-20160816; b=B2z0HBNOwv6aSW1TgeBKVUYMGE8lMn8ZMQlZmnxVj57BhT61ucf3mPCx6fn7geWi+L 0phUTm270DFjxPmGCvcYYJr6xXR01+QPg0KWo11rsksQfDqp1BGx8seTJZD/BGYHk6rN cvNYnJRIIg6zv7ghmy03SGFcitzXZzNc8LdjUGMr5xyx3DhpqxXB39FnKBBOKg9HQI3r fOS6I0qwc5q+sXTxpklQTIaDDsFW9TQ3yR6754eV9QaDKn7Fmx44IuU2kLm8BhAQNKIp zwrtNUSBdtXzXyfdNyk7WyqbZm3MsV9Sv7+YPt71H2MZ41qlZOIQ5v81AVoiQQ20ZLEm 1DcQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=0A6bsKtl/n5AjaoLWZ0koi9aN5D/Is3h0kCJR9oSogI=; b=xVzjhTLRjZKxM7IMAJvQif0icsHihnMOn19d2w0QBa3fII+TBF/rCZ0gBBeWMGzClH p3vxHLaqY4JafYLsGx77aSF7mlHJfFqs/ZdmZsjSaBIiCQkC2CFYh5yfqIhG8d65pmfg l9cIyymwR5R5kcSYigdgpYVFKvsGuLWFLPhCFYtbgZ0E5BgtM7N4xDx1OY529IgRssx8 gtkvS2MOoQOfDBkWWhT7UpNF85n1Snmr7KgUCzGkIlQ7iMe3wd/d7QOCi5o7kMJu27TV 2R/7jX2xgH1bpA7MpHeigGYCyQ8Tg/HYwRTB+emO5ganezwnvs08Z2Xwivra5FP4fZEq GxXw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=EknbZN8V; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i7si2071910qvo.36.2020.04.11.05.26.33; Sat, 11 Apr 2020 05:26:48 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=EknbZN8V; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728031AbgDKMRA (ORCPT + 99 others); Sat, 11 Apr 2020 08:17:00 -0400 Received: from mail.kernel.org ([198.145.29.99]:51402 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728160AbgDKMQ5 (ORCPT ); Sat, 11 Apr 2020 08:16:57 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 57B4B20644; Sat, 11 Apr 2020 12:16:56 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1586607416; bh=EmfY0OTG7JZDE8KriKilKrAHF7WbXWBGs5/1e/lrTow=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=EknbZN8V4zl/2D7qudtICkum+53KytjJkKejc23m1PbcK9fTPbAGL6W7Qq+SX/46V 0G6DYkQjMexd9t14sfTsYmO9Lerv+0cldQffvxnaZE9x14v2hbDU08eLYxFFCzZSvu QPjIrrc8ISzE1VNuWC9rIqXIPT6qDQnnO1r3fpKI= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Richard Palethorpe , Kees Cook , linux-can@vger.kernel.org, netdev@vger.kernel.org, security@kernel.org, wg@grandegger.com, mkl@pengutronix.de, davem@davemloft.net Subject: [PATCH 5.4 11/41] slcan: Dont transmit uninitialized stack data in padding Date: Sat, 11 Apr 2020 14:09:20 +0200 Message-Id: <20200411115504.898395559@linuxfoundation.org> X-Mailer: git-send-email 2.26.0 In-Reply-To: <20200411115504.124035693@linuxfoundation.org> References: <20200411115504.124035693@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Richard Palethorpe [ Upstream commit b9258a2cece4ec1f020715fe3554bc2e360f6264 ] struct can_frame contains some padding which is not explicitly zeroed in slc_bump. This uninitialized data will then be transmitted if the stack initialization hardening feature is not enabled (CONFIG_INIT_STACK_ALL). This commit just zeroes the whole struct including the padding. Signed-off-by: Richard Palethorpe Fixes: a1044e36e457 ("can: add slcan driver for serial/USB-serial CAN adapters") Reviewed-by: Kees Cook Cc: linux-can@vger.kernel.org Cc: netdev@vger.kernel.org Cc: security@kernel.org Cc: wg@grandegger.com Cc: mkl@pengutronix.de Cc: davem@davemloft.net Acked-by: Marc Kleine-Budde Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- drivers/net/can/slcan.c | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) --- a/drivers/net/can/slcan.c +++ b/drivers/net/can/slcan.c @@ -148,7 +148,7 @@ static void slc_bump(struct slcan *sl) u32 tmpid; char *cmd = sl->rbuff; - cf.can_id = 0; + memset(&cf, 0, sizeof(cf)); switch (*cmd) { case 'r': @@ -187,8 +187,6 @@ static void slc_bump(struct slcan *sl) else return; - *(u64 *) (&cf.data) = 0; /* clear payload */ - /* RTR frames may have a dlc > 0 but they never have any data bytes */ if (!(cf.can_id & CAN_RTR_FLAG)) { for (i = 0; i < cf.can_dlc; i++) {