Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp3128620pxf; Mon, 5 Apr 2021 04:08:41 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwSJJBlECq+mjaDr5+ySWuOG4K1oQS4z9U07E656MamPBIPSICCpcW1EFgp28ItRAQqfvnj X-Received: by 2002:a05:6602:2056:: with SMTP id z22mr19743027iod.21.1617620921457; Mon, 05 Apr 2021 04:08:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1617620921; cv=none; d=google.com; s=arc-20160816; b=utLWC9QJRp3qN9Z4tbnQxJ3pGtRNS6goO3wEXKFSiou40qdmr8X7vJxwAv7D4n2mSw M1qkyB4s/Iy01Yk5vEVnmi1u+j3vYt0GMmpa5JxPGx1Z3tygx/NRBKegGDMjaq/B2Kuy nRR9nNbOsANezsXtuCMaCl+1p6NEsvFEawYbdGyRDX5QnWO41DxUIvMSfJ6ViWjEHuhk lzGIDNKLb1Et6Vn65vTHsgChQT6sFxKlxtiN05P5pHCOHjnZYOm4clVt17mypcmbdYgU zVRdwgfYdhaBrTZgPg2Za+ucnwFQrHiSAh7YyTkt2YyWXw/9jBNXwmCV4mH/qi+1tHOc d0BQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=Mst8cBf5R5sYXoNLuk6qd01z5j+FDnZisL7wzQs+ktA=; b=Q0uvw2II5wrDPQc2RXnwDKJywRlUwagKd+vPzsate0fnB2tXzwhaRpQJvuWqUwnemc x88bFYFSy/661SwombqaxCgbMO0MyNq+1GduX2kMrMf7wIPuZ8VH7DIgIJJM21QEvWKF YiFR6v1zBa0BVWJty+cTyS405dtEUToIqeZAfn0hl5uj4HiQjA0+YVb16tWHRXzHGie5 Lo91YsjiiPkqa7QERSQQ76nGuVsTNa0+EUtVJgcTGg5/btnXfQPIQG1AAj9KbcWaB2pX FVHLfVrZl94rmR5UIqjYLuBh+xSbXT885oU1iawtJiuvXpWlsBzNGZM2rbvTu+UfwZZv FQBA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=0jeBWuNx; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id e12si14414783ilq.94.2021.04.05.04.08.29; Mon, 05 Apr 2021 04:08:41 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=0jeBWuNx; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233591AbhDEI6b (ORCPT + 99 others); Mon, 5 Apr 2021 04:58:31 -0400 Received: from mail.kernel.org ([198.145.29.99]:37732 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233412AbhDEI54 (ORCPT ); Mon, 5 Apr 2021 04:57:56 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 298BF61394; Mon, 5 Apr 2021 08:57:50 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1617613070; bh=DGygBtLJa/yKzYG591I1aoO7BnJv1M2SDAXPEDEBLdk=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=0jeBWuNxDzZEAKT64te+ja47iq9N0qCQgx7xJJAVOduq6j9W7ZozihLucimTdVrJH ohx/amWt5UEkwqkNxxhyac+gQImBt1KRKS/Vc3Edv4qSoRtUqlPmZpGNHssUoF6K75 lYsVjNTyNdJA9R954wYto7xB6RtjltJAdydnUX1Y= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Atul Gopinathan Subject: [PATCH 4.9 32/35] staging: rtl8192e: Fix incorrect source in memcpy() Date: Mon, 5 Apr 2021 10:54:07 +0200 Message-Id: <20210405085019.884517664@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210405085018.871387942@linuxfoundation.org> References: <20210405085018.871387942@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Atul Gopinathan commit 72ad25fbbb78930f892b191637359ab5b94b3190 upstream. The variable "info_element" is of the following type: struct rtllib_info_element *info_element defined in drivers/staging/rtl8192e/rtllib.h: struct rtllib_info_element { u8 id; u8 len; u8 data[]; } __packed; The "len" field defines the size of the "data[]" array. The code is supposed to check if "info_element->len" is greater than 4 and later equal to 6. If this is satisfied then, the last two bytes (the 4th and 5th element of u8 "data[]" array) are copied into "network->CcxRmState". Right now the code uses "memcpy()" with the source as "&info_element[4]" which would copy in wrong and unintended information. The struct "rtllib_info_element" has a size of 2 bytes for "id" and "len", therefore indexing will be done in interval of 2 bytes. So, "info_element[4]" would point to data which is beyond the memory allocated for this pointer (that is, at x+8, while "info_element" has been allocated only from x to x+7 (2 + 6 => 8 bytes)). This patch rectifies this error by using "&info_element->data[4]" which correctly copies the last two bytes of "data[]". NOTE: The faulty line of code came from the following commit: commit ecdfa44610fa ("Staging: add Realtek 8192 PCI wireless driver") The above commit created the file `rtl8192e/ieee80211/ieee80211_rx.c` which had the faulty line of code. This file has been deleted (or possibly renamed) with the contents copied in to a new file `rtl8192e/rtllib_rx.c` along with additional code in the commit 94a799425eee (tagged in Fixes). Fixes: 94a799425eee ("From: wlanfae [PATCH 1/8] rtl8192e: Import new version of driver from realtek") Cc: stable@vger.kernel.org Signed-off-by: Atul Gopinathan Link: https://lore.kernel.org/r/20210323113413.29179-1-atulgopinathan@gmail.com Signed-off-by: Greg Kroah-Hartman --- drivers/staging/rtl8192e/rtllib_rx.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/drivers/staging/rtl8192e/rtllib_rx.c +++ b/drivers/staging/rtl8192e/rtllib_rx.c @@ -1986,7 +1986,7 @@ static void rtllib_parse_mife_generic(st info_element->data[2] == 0x96 && info_element->data[3] == 0x01) { if (info_element->len == 6) { - memcpy(network->CcxRmState, &info_element[4], 2); + memcpy(network->CcxRmState, &info_element->data[4], 2); if (network->CcxRmState[0] != 0) network->bCcxRmEnable = true; else