Received: by 2002:a05:6359:c8b:b0:c7:702f:21d4 with SMTP id go11csp820633rwb; Mon, 26 Sep 2022 06:20:09 -0700 (PDT) X-Google-Smtp-Source: AMsMyM5giu2bQ7c0Z6CXVJrVXdEtSQQ6rjVLEer3TGDzNix173Fo44erzSTONMwjZwx9+3NaBYkx X-Received: by 2002:a17:907:7629:b0:776:a147:8524 with SMTP id jy9-20020a170907762900b00776a1478524mr18690134ejc.632.1664198409301; Mon, 26 Sep 2022 06:20:09 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1664198409; cv=none; d=google.com; s=arc-20160816; b=C6dHJRbyxUxAtR8xmD/2SgMLQjbtRKCWp4NVwRvbKkQHFJ6HB2mYgyKprgAstpnQc8 /Br2y71eDQrud2R2VeWtXSH4htVMnjWUoVPf5G7CEGQiONTxhinKfFPLIhXXgScR7ccr Y8oQPO+rFqEAYW7wED+umuHV8hnNJCqyOczHgg2sd8aBJwnIV34nCxONIzjJco0IIkeI Ok2oIsmeleqY21vnQQ65OOgkRA8yRhGoVEyQlRcEX2kSFoyr1jBGC8T6ETJUJ6RlNcgN 0GhRdEMcwyEdrAfuHpBqJrzn685dooewBuBDr/AyN3oU4kF6wiiNW219rX6MhqJInaec Nv0w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=FOJ/B1jO45ZIW2pIT5xND6/X4Lun+ol4ga9hHdvITFQ=; b=JzDnGfAvRJ19p3Jim52BhD1QPsFDsrjK7UAQoAOiqdNCsETL2y8xEk1crMgv1EWavf fHdt3K3+OqLzhj2Tw0hufN9WkFmMPV91bXNX54TCJg9FfsJTcikgITDwcUjnLZORHuDW SY7hFL+0BBZKHXpLIhmzTpRPaj1WgBAnoXYLea9DiM4WwIsZIzXQeGrD0qyf2mIfJe7U BB3IrhNlmo94fHSe4yKzSmFrsrHTzIfiyzhuUheNHh49713fhQDnqcdhnJXeq3KxRC0y KWQ5ceHeHy8OyV8+CyTRsioWNR8LVBCKw/IKeRNuSm4LYu83xjKSWEtvqcFbUbQkqqnV zh/A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=p4oudoJF; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id wt1-20020a170906ee8100b0073d866e5d4dsi18311611ejb.98.2022.09.26.06.19.41; Mon, 26 Sep 2022 06:20:09 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=p4oudoJF; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237743AbiIZLUw (ORCPT + 99 others); Mon, 26 Sep 2022 07:20:52 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41068 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237812AbiIZLTD (ORCPT ); Mon, 26 Sep 2022 07:19:03 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [IPv6:2604:1380:4601:e00::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id EDBFD52E56; Mon, 26 Sep 2022 03:38:38 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 6AA2BB80957; Mon, 26 Sep 2022 10:38:25 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id BD622C433C1; Mon, 26 Sep 2022 10:38:23 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1664188704; bh=STN83xp9evJqJZLuHCkw/lnhnKc/4/65pi4u/jxUtL8=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=p4oudoJFzw3en4IWk/RrcGsRD4xBXHKw0f/DWz8LqTEsH/Sut+lL0fxbqMaCR3mtG QNrrC8PRvC35O/h1P88YYxioA9O1AWWdyOqCl/AtfKTyIwWCdthtejiz4wUwxsKoho KUe0nfcQMKS8q9m0qQaQnXtvZxSR2JC+GE4foImg= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, "Jason A. Donenfeld" , Kees Cook , syzbot+a448cda4dba2dac50de5@syzkaller.appspotmail.com, Jakub Kicinski , Sasha Levin Subject: [PATCH 5.15 095/148] wireguard: netlink: avoid variable-sized memcpy on sockaddr Date: Mon, 26 Sep 2022 12:12:09 +0200 Message-Id: <20220926100759.641942551@linuxfoundation.org> X-Mailer: git-send-email 2.37.3 In-Reply-To: <20220926100756.074519146@linuxfoundation.org> References: <20220926100756.074519146@linuxfoundation.org> User-Agent: quilt/0.67 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.2 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Jason A. Donenfeld [ Upstream commit 26c013108c12b94bc023bf19198a4300596c98b1 ] Doing a variable-sized memcpy is slower, and the compiler isn't smart enough to turn this into a constant-size assignment. Further, Kees' latest fortified memcpy will actually bark, because the destination pointer is type sockaddr, not explicitly sockaddr_in or sockaddr_in6, so it thinks there's an overflow: memcpy: detected field-spanning write (size 28) of single field "&endpoint.addr" at drivers/net/wireguard/netlink.c:446 (size 16) Fix this by just assigning by using explicit casts for each checked case. Fixes: e7096c131e51 ("net: WireGuard secure network tunnel") Signed-off-by: Jason A. Donenfeld Reviewed-by: Kees Cook Reported-by: syzbot+a448cda4dba2dac50de5@syzkaller.appspotmail.com Signed-off-by: Jakub Kicinski Signed-off-by: Sasha Levin --- drivers/net/wireguard/netlink.c | 13 ++++++------- 1 file changed, 6 insertions(+), 7 deletions(-) diff --git a/drivers/net/wireguard/netlink.c b/drivers/net/wireguard/netlink.c index d0f3b6d7f408..5c804bcabfe6 100644 --- a/drivers/net/wireguard/netlink.c +++ b/drivers/net/wireguard/netlink.c @@ -436,14 +436,13 @@ static int set_peer(struct wg_device *wg, struct nlattr **attrs) if (attrs[WGPEER_A_ENDPOINT]) { struct sockaddr *addr = nla_data(attrs[WGPEER_A_ENDPOINT]); size_t len = nla_len(attrs[WGPEER_A_ENDPOINT]); + struct endpoint endpoint = { { { 0 } } }; - if ((len == sizeof(struct sockaddr_in) && - addr->sa_family == AF_INET) || - (len == sizeof(struct sockaddr_in6) && - addr->sa_family == AF_INET6)) { - struct endpoint endpoint = { { { 0 } } }; - - memcpy(&endpoint.addr, addr, len); + if (len == sizeof(struct sockaddr_in) && addr->sa_family == AF_INET) { + endpoint.addr4 = *(struct sockaddr_in *)addr; + wg_socket_set_peer_endpoint(peer, &endpoint); + } else if (len == sizeof(struct sockaddr_in6) && addr->sa_family == AF_INET6) { + endpoint.addr6 = *(struct sockaddr_in6 *)addr; wg_socket_set_peer_endpoint(peer, &endpoint); } } -- 2.35.1