Received: by 2002:a25:683:0:0:0:0:0 with SMTP id 125csp2174970ybg; Fri, 5 Jun 2020 07:26:26 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx+mWbYXyv+BeVYaMDif6G6yn6lKF9zEoK7a0644d6/cp1vVdZGxCBUp+ABNmDnGmm8jh6e X-Received: by 2002:a17:906:4009:: with SMTP id v9mr1742369ejj.481.1591367186531; Fri, 05 Jun 2020 07:26:26 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1591367186; cv=none; d=google.com; s=arc-20160816; b=CXoGwrzHANgM5+EhlXUmE23pMqzSUT3X0ekSWcFESnzfhxUcul+c/aCX9n5YNtX7q8 H/JiIjOytL8RmFZpX0NoGKqLHNMsttmwrb/kJjHAKi7953o7QOa+DzPushFI8fHSdSyk tslTEnmay2hX24mWgFOVxvJiszRsIVNK2EkzIHh0N+/VoEm07PB4siWpCP73HNuZRbtX xNvYAUVFM05QiddIAW6wkTJYzIF4jIIkOan0ipurYGgdyX+s1B6WFyNuw9jfgE7qC1FG rUC+ziRpguL30rG2n7HPwur3th7lQlok2W9yJBx/zAIJjO+sULC3/mCrrvVO30ry5Jv7 QMUA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=tP1KzMuQcOEeCwlay8NgypW3u3OpR/wgre74cfLfsuA=; b=rE0QeBXQr5MgijBd5vFeuthcMcUgWSx5NqLIsOh2PGFrLrHuzhkIVlhNaUF313wDVw fjdEG5Ae4pHx6X3c5Vh3iuPAecrscyI8MbEETtYgogPXK8AgjCZM7ZguiiN1nI3259nc 5p8MlGsOxcjj5AILzjqKsGkC2NcNrwdamAFrVmtNQsVZic5c0Wy1R5QuBkbMY8wmb99T qeYcR2tV0+wNf4XyDmSN16aClleye3zyMEEIkwM0/Pn3HFZ6x+XOqBPZLZhZQA55vM7y wnl/ZhsjKbJ3E8HuONPE/cT8KMVQxhsCXNvACVnfLtcpAcNQdFEbzOu32hgHxlj+1Vsx xUCA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="eA9/72DJ"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id t15si3733893edr.173.2020.06.05.07.26.03; Fri, 05 Jun 2020 07:26:26 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="eA9/72DJ"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728083AbgFEOWM (ORCPT + 99 others); Fri, 5 Jun 2020 10:22:12 -0400 Received: from mail.kernel.org ([198.145.29.99]:50400 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728838AbgFEOTc (ORCPT ); Fri, 5 Jun 2020 10:19:32 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 674412086A; Fri, 5 Jun 2020 14:19:31 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1591366771; bh=I/C5wTw0k+vOVdGvsWnZiMB/R9OHvicC4Y/1i2mXlxo=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=eA9/72DJJisvAjf8gXW4QdbfdIIOx9M6z0sd3QyZvnBq1g+RSBi94q+wU+szuR9Bu qrYLIwihxlVy8vW7hdNdBlaMTLnt9xnuCU10KxHI0NKGy5+vF4DkAWDDCJrp+qWGi2 8U/BCSQc/NFsXDmenHqdwldHpu6PHJ6WdtvjXjQ4= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Hu Jiahui , Dan Carpenter , Eric Dumazet , Kalle Valo Subject: [PATCH 4.19 11/28] airo: Fix read overflows sending packets Date: Fri, 5 Jun 2020 16:15:13 +0200 Message-Id: <20200605140253.020506861@linuxfoundation.org> X-Mailer: git-send-email 2.27.0 In-Reply-To: <20200605140252.338635395@linuxfoundation.org> References: <20200605140252.338635395@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Dan Carpenter commit 11e7a91994c29da96d847f676be023da6a2c1359 upstream. The problem is that we always copy a minimum of ETH_ZLEN (60) bytes from skb->data even when skb->len is less than ETH_ZLEN so it leads to a read overflow. The fix is to pad skb->data to at least ETH_ZLEN bytes. Cc: Reported-by: Hu Jiahui Signed-off-by: Dan Carpenter Reviewed-by: Eric Dumazet Signed-off-by: Kalle Valo Link: https://lore.kernel.org/r/20200527184830.GA1164846@mwanda Signed-off-by: Greg Kroah-Hartman --- drivers/net/wireless/cisco/airo.c | 12 ++++++++++++ 1 file changed, 12 insertions(+) --- a/drivers/net/wireless/cisco/airo.c +++ b/drivers/net/wireless/cisco/airo.c @@ -1928,6 +1928,10 @@ static netdev_tx_t mpi_start_xmit(struct airo_print_err(dev->name, "%s: skb == NULL!",__func__); return NETDEV_TX_OK; } + if (skb_padto(skb, ETH_ZLEN)) { + dev->stats.tx_dropped++; + return NETDEV_TX_OK; + } npacks = skb_queue_len (&ai->txq); if (npacks >= MAXTXQ - 1) { @@ -2130,6 +2134,10 @@ static netdev_tx_t airo_start_xmit(struc airo_print_err(dev->name, "%s: skb == NULL!", __func__); return NETDEV_TX_OK; } + if (skb_padto(skb, ETH_ZLEN)) { + dev->stats.tx_dropped++; + return NETDEV_TX_OK; + } /* Find a vacant FID */ for( i = 0; i < MAX_FIDS / 2 && (fids[i] & 0xffff0000); i++ ); @@ -2204,6 +2212,10 @@ static netdev_tx_t airo_start_xmit11(str airo_print_err(dev->name, "%s: skb == NULL!", __func__); return NETDEV_TX_OK; } + if (skb_padto(skb, ETH_ZLEN)) { + dev->stats.tx_dropped++; + return NETDEV_TX_OK; + } /* Find a vacant FID */ for( i = MAX_FIDS / 2; i < MAX_FIDS && (fids[i] & 0xffff0000); i++ );