Received: by 2002:a25:683:0:0:0:0:0 with SMTP id 125csp2176815ybg; Fri, 5 Jun 2020 07:28:56 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyjONeOXJY4WgCmelk6PUlIxCro+rlnxdW60dn7F2VsPpWTto1zn8RT/IDiFPBe77br9u5z X-Received: by 2002:aa7:d48f:: with SMTP id b15mr10168334edr.8.1591367336379; Fri, 05 Jun 2020 07:28:56 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1591367336; cv=none; d=google.com; s=arc-20160816; b=OBCUWPdAnIZ8jLQ3RGn1ElyVz9Bg6IGfqT0qgqpaqIIgfWnJ0iD9wvS8omtVFB+9XL BxnjU1jEz2UWCeZiBOT331bMa89dQABnfnKDk5WHPed/Rv8z7cipExuvCUWWLRLPv9LL snNfyqVrtIdLOg4CeaJwykXj1ETtMUOxhP4JegbyJ37IMs+7r5X5QF5Qnn6KPNO9JJRQ h0Dy49Oh/eRsC+Y65l0hDifoGt0Gg6rDP1sn8tRaLHpidxMxCzhVm5ziG1sZxYXG59AN qFmu+Gs4F/s+b0HKM/Wlrn+CUbVpvQecm/fJgB6Yx1OHCQBvKtt20+ztXoBdtW3x8A3x Ybhg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=X3tfuv0+xzwM1P3OhYaH4rSqIZ8Ekm1NkgtOCk4Rx4s=; b=CeYKLofTtxPfPgiSh6cd9RBX110XKq66nn2U+QDRv+3+KjolDWzKmpvH5DKSCwl1KM F2rxqSUhNPcTxC5pXWVRlLBrbUviQuQFVG7zL2FwbxSrM2s+HCULAOM9eo8bf9oplM0j kWXao0rx6dPbiTsB7B60rM1KX82xG6E4BdpR00Y1ELj5LxsltfL7hHGCnc6O+tvnoiHt b65/ThThXIeZ9qDMpyk1zjwLez8IAcgozOegz2pHCzv3ts+hujIMm2iDBVh0OtBwIMZC JKqjLd135mC/9C89vrfSfZHO5FoxCUFj1SoUyV/DA5vPHajShPr/NnMb0TpjsFtLUvxW Zm0g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=tbuYbC6P; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id f23si3628985ejl.366.2020.06.05.07.28.33; Fri, 05 Jun 2020 07:28:56 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=tbuYbC6P; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728639AbgFEOXf (ORCPT + 99 others); Fri, 5 Jun 2020 10:23:35 -0400 Received: from mail.kernel.org ([198.145.29.99]:48632 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728615AbgFEOSK (ORCPT ); Fri, 5 Jun 2020 10:18:10 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 2F4A62086A; Fri, 5 Jun 2020 14:18:09 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1591366689; bh=KX0wPoZfWnP4R5JzHVE4rOgaZ7FssBpsYKHdzxcphs4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=tbuYbC6PE8w8M7RA2FSx+0fOD2+Lb1Jb0DOIyvu4wAWF2q7Wbdl+cWgyjkvH8zbvQ fYaGMlE9Sc7nXWF1ydhpoTK7VHMaS6NrcNcbmM2j/nwHvtANesR4zaJrINefCTQwFU SimZSzxWkAw9vnZGRGK144A72rBlDexZf3ZADE2Q= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Hu Jiahui , Dan Carpenter , Eric Dumazet , Kalle Valo Subject: [PATCH 5.4 14/38] airo: Fix read overflows sending packets Date: Fri, 5 Jun 2020 16:14:57 +0200 Message-Id: <20200605140253.426961596@linuxfoundation.org> X-Mailer: git-send-email 2.27.0 In-Reply-To: <20200605140252.542768750@linuxfoundation.org> References: <20200605140252.542768750@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Dan Carpenter commit 11e7a91994c29da96d847f676be023da6a2c1359 upstream. The problem is that we always copy a minimum of ETH_ZLEN (60) bytes from skb->data even when skb->len is less than ETH_ZLEN so it leads to a read overflow. The fix is to pad skb->data to at least ETH_ZLEN bytes. Cc: Reported-by: Hu Jiahui Signed-off-by: Dan Carpenter Reviewed-by: Eric Dumazet Signed-off-by: Kalle Valo Link: https://lore.kernel.org/r/20200527184830.GA1164846@mwanda Signed-off-by: Greg Kroah-Hartman --- drivers/net/wireless/cisco/airo.c | 12 ++++++++++++ 1 file changed, 12 insertions(+) --- a/drivers/net/wireless/cisco/airo.c +++ b/drivers/net/wireless/cisco/airo.c @@ -1925,6 +1925,10 @@ static netdev_tx_t mpi_start_xmit(struct airo_print_err(dev->name, "%s: skb == NULL!",__func__); return NETDEV_TX_OK; } + if (skb_padto(skb, ETH_ZLEN)) { + dev->stats.tx_dropped++; + return NETDEV_TX_OK; + } npacks = skb_queue_len (&ai->txq); if (npacks >= MAXTXQ - 1) { @@ -2127,6 +2131,10 @@ static netdev_tx_t airo_start_xmit(struc airo_print_err(dev->name, "%s: skb == NULL!", __func__); return NETDEV_TX_OK; } + if (skb_padto(skb, ETH_ZLEN)) { + dev->stats.tx_dropped++; + return NETDEV_TX_OK; + } /* Find a vacant FID */ for( i = 0; i < MAX_FIDS / 2 && (fids[i] & 0xffff0000); i++ ); @@ -2201,6 +2209,10 @@ static netdev_tx_t airo_start_xmit11(str airo_print_err(dev->name, "%s: skb == NULL!", __func__); return NETDEV_TX_OK; } + if (skb_padto(skb, ETH_ZLEN)) { + dev->stats.tx_dropped++; + return NETDEV_TX_OK; + } /* Find a vacant FID */ for( i = MAX_FIDS / 2; i < MAX_FIDS && (fids[i] & 0xffff0000); i++ );