Received: by 2002:a25:e74b:0:0:0:0:0 with SMTP id e72csp940056ybh; Wed, 22 Jul 2020 17:57:56 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx4xq19g5Lh2CDO6zxo0+h8ncV+T3/3vdD2jHZkN3NncUFLlwwqPA+7weXjM6MVK+ui6/II X-Received: by 2002:a17:906:f181:: with SMTP id gs1mr2115463ejb.293.1595465876709; Wed, 22 Jul 2020 17:57:56 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1595465876; cv=none; d=google.com; s=arc-20160816; b=gy6iXOKU/VMOODnx8QrHJmyRcci3BtBS8R/TXHXhDQbvsYNE2dSaZWHI2TqLuOTI0G XbSnnweNYHRwc9kVrie3xbZ59uVKOMBkvf4fThn6ngEuOIpvhmuChh9qhCh46XORPKfj LqjFvSlBR1FxclRscnpdDDxlLLnGeim+yBNoCgcqRfqu6QEIxIGakfGfsEOFHsxSw/mf 7kVnRAGwZAdoDFxLcPd4kiB1uYnWlotAvxXHud64P0p1w8IQU+aCXVAs4/yXTLA6N6nz 7vktysvCjaeWpCKAiMbcCCEhvroBxEbMmIXXx3OJxlwQqiNGxhbAiHRV8L4PPCGizzSu YCDw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:from:subject:cc:to:message-id:date; bh=jSt/RSS55HDzExzO9eFgPBPCG1UQ1PEBseq394VT6UI=; b=voUT5ZDGiEspXJLDJH596Q8s/DT10rwwuqLEI7QvPPToelWvOxrTCU2ogRuSqTAAWG SRkO1OXOnItgk0RlC+ICeNirCRSPsdXlXFNPdOIaVXDiFutgL+b33kyFDutX0q95Xd+f 2UeXtgiw01GCwPa7gWznhINcD1qg73h7fV37JkOQXCVn8FerDgSDtgDhNSW25n7lG9ZB 0ElDKHOZCdKaYH9fiiMCOfGS0+OHKsXOJ485aFtJB/f4dpdwa1y1HJAAXe4F5Mxrgp57 00tibic6IwmxWI1fUCMxE9fErI3k3Wqe6XD+wQpjcCyDNw8JZxXvag0JBtps+0S9YoFk e8rw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id w13si991163eju.736.2020.07.22.17.57.34; Wed, 22 Jul 2020 17:57:56 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2387422AbgGWA5R (ORCPT + 99 others); Wed, 22 Jul 2020 20:57:17 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:36610 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728607AbgGWA5Q (ORCPT ); Wed, 22 Jul 2020 20:57:16 -0400 Received: from shards.monkeyblade.net (shards.monkeyblade.net [IPv6:2620:137:e000::1:9]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 82323C0619DC; Wed, 22 Jul 2020 17:57:16 -0700 (PDT) Received: from localhost (unknown [IPv6:2601:601:9f00:477::3d5]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (Client did not present a certificate) (Authenticated sender: davem-davemloft) by shards.monkeyblade.net (Postfix) with ESMTPSA id DDCEB126ABE80; Wed, 22 Jul 2020 17:40:29 -0700 (PDT) Date: Wed, 22 Jul 2020 17:57:14 -0700 (PDT) Message-Id: <20200722.175714.1713497446730685740.davem@davemloft.net> To: yepeilin.cs@gmail.com Cc: jreuter@yaina.de, ralf@linux-mips.org, gregkh@linuxfoundation.org, syzkaller-bugs@googlegroups.com, linux-kernel-mentees@lists.linuxfoundation.org, kuba@kernel.org, linux-hams@vger.kernel.org, netdev@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [Linux-kernel-mentees] [PATCH net] AX.25: Fix out-of-bounds read in ax25_connect() From: David Miller In-Reply-To: <20200722151901.350003-1-yepeilin.cs@gmail.com> References: <20200722151901.350003-1-yepeilin.cs@gmail.com> X-Mailer: Mew version 6.8 on Emacs 26.3 Mime-Version: 1.0 Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.5.12 (shards.monkeyblade.net [149.20.54.216]); Wed, 22 Jul 2020 17:40:30 -0700 (PDT) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Peilin Ye Date: Wed, 22 Jul 2020 11:19:01 -0400 > Checks on `addr_len` and `fsa->fsa_ax25.sax25_ndigis` are insufficient. > ax25_connect() can go out of bounds when `fsa->fsa_ax25.sax25_ndigis` > equals to 7 or 8. Fix it. > > This issue has been reported as a KMSAN uninit-value bug, because in such > a case, ax25_connect() reaches into the uninitialized portion of the > `struct sockaddr_storage` statically allocated in __sys_connect(). > > It is safe to remove `fsa->fsa_ax25.sax25_ndigis > AX25_MAX_DIGIS` because > `addr_len` is guaranteed to be less than or equal to > `sizeof(struct full_sockaddr_ax25)`. > > Reported-by: syzbot+c82752228ed975b0a623@syzkaller.appspotmail.com > Link: https://syzkaller.appspot.com/bug?id=55ef9d629f3b3d7d70b69558015b63b48d01af66 > Signed-off-by: Peilin Ye Applied and queued up for -stable, thanks.