Received: by 2002:a05:6358:1087:b0:cb:c9d3:cd90 with SMTP id j7csp1300326rwi; Thu, 13 Oct 2022 11:41:32 -0700 (PDT) X-Google-Smtp-Source: AMsMyM7MbcTj8hf0TQIYhfqYf6E2tXmvC6kPH/mtvgsbwQ+SXv7cOLI6FZezvpzFHemqM8hV0FOK X-Received: by 2002:a05:6402:3c5:b0:45b:55d8:21ff with SMTP id t5-20020a05640203c500b0045b55d821ffmr971860edw.253.1665686491517; Thu, 13 Oct 2022 11:41:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1665686491; cv=none; d=google.com; s=arc-20160816; b=lNLT7ff0mzmowZYRg7B2BFLHVq3uoYhrLlRd6h6c4g2rZj4uEIKXDAn1m6ba6n0150 0Rt9B3qJf5rUO6BV1UHH/6h0nTgdfRVQdTNizvZTaQyEU8E8IfpTsrY5HtXEVJdRpD22 VQZtslLhgti4x5/LXjFKo9s12aj/wIF5HoZBz48ONhxRElIxm6c4KsPYlG+7LJUS3PaZ MVASbNKTdFQmXh2CsxKX8hpHdHSR0iMEvvZfiXb0eq/2w1mfIGF4loyn/NVEkVwekHlG 1q/wLRV4tZVStaDhMW6ajfYuW9e/fXVHYti6U8fXNdLRPBaSLXcKcxNb9EgJsTg6Qgbb XAJA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=+sj+1pjDe2qwAtycRwj/aoNEuIQNSsbr+6RKm1o559g=; b=PwHAZgfeLXs7Vvk/1mYTkGdnyGQ/HjSXxpWK8iZE7/41v9yMLUDmO4h/27NCc3Y0HC ArJ0szsuovkkZVHNI/zH+Ut4k8mYfWPRqVWWtyV+qMNe2AxhRxqF9J6Ya2EUTwCDDFu2 RDWv0EEtjqml9N+23fSd3Hu6VS/QwUnzdIS1kMW5ITejp+YjsGQ6CRk2kPxAEjSmA/DH PA8vo1stRlmdkc1SZIUXDmdPyMe/W3UxGcWzdDV+XmtWElRuVsUDBUGpypH5oZXJGcmi ayKHAgtTkcFoovtNAamCuR/HCvDtv7kYmn+Lhj467ZdczovnWZmnL4qomVW1l2zxid49 ZALg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b="Zg/0A5eQ"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id u2-20020a509502000000b004595af54eacsi456899eda.226.2022.10.13.11.41.02; Thu, 13 Oct 2022 11:41:31 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b="Zg/0A5eQ"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231352AbiJMSPH (ORCPT + 99 others); Thu, 13 Oct 2022 14:15:07 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38916 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231319AbiJMSL4 (ORCPT ); Thu, 13 Oct 2022 14:11:56 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [IPv6:2604:1380:4601:e00::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id CDB1215625A; Thu, 13 Oct 2022 11:08:45 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 07606B8208B; Thu, 13 Oct 2022 18:01:40 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 68EA4C433C1; Thu, 13 Oct 2022 18:01:38 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1665684098; bh=7ADSkhJgMzgbvEfxkGhKSmMII+dlmQ0WYUlz4phgh+4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Zg/0A5eQm5s2wmpJv7V7MapZZbEZxrWWwqZotrz1s+xUlwUcrLeVcXVr2Sqw+5l25 nGbtvcMTiiKAyjrq2gr4kHbPh2ywKtRDfQPNFwVLzKMChyWuITx93xtVAgYl7hsLZw x8osLPwJ0SGtrd+GluwGMuiwDwnImGCqpVePPctU= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Soenke Huster , Johannes Berg Subject: [PATCH 6.0 24/34] wifi: cfg80211: ensure length byte is present before access Date: Thu, 13 Oct 2022 19:53:02 +0200 Message-Id: <20221013175147.143750056@linuxfoundation.org> X-Mailer: git-send-email 2.38.0 In-Reply-To: <20221013175146.507746257@linuxfoundation.org> References: <20221013175146.507746257@linuxfoundation.org> User-Agent: quilt/0.67 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Johannes Berg commit 567e14e39e8f8c6997a1378bc3be615afca86063 upstream. When iterating the elements here, ensure the length byte is present before checking it to see if the entire element will fit into the buffer. Longer term, we should rewrite this code using the type-safe element iteration macros that check all of this. Fixes: 0b8fb8235be8 ("cfg80211: Parsing of Multiple BSSID information in scanning") Reported-by: Soenke Huster Signed-off-by: Johannes Berg Signed-off-by: Greg Kroah-Hartman --- net/wireless/scan.c | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) --- a/net/wireless/scan.c +++ b/net/wireless/scan.c @@ -304,7 +304,8 @@ static size_t cfg80211_gen_new_ie(const tmp_old = cfg80211_find_ie(WLAN_EID_SSID, ie, ielen); tmp_old = (tmp_old) ? tmp_old + tmp_old[1] + 2 : ie; - while (tmp_old + tmp_old[1] + 2 - ie <= ielen) { + while (tmp_old + 2 - ie <= ielen && + tmp_old + tmp_old[1] + 2 - ie <= ielen) { if (tmp_old[0] == 0) { tmp_old++; continue; @@ -364,7 +365,8 @@ static size_t cfg80211_gen_new_ie(const * copied to new ie, skip ssid, capability, bssid-index ie */ tmp_new = sub_copy; - while (tmp_new + tmp_new[1] + 2 - sub_copy <= subie_len) { + while (tmp_new + 2 - sub_copy <= subie_len && + tmp_new + tmp_new[1] + 2 - sub_copy <= subie_len) { if (!(tmp_new[0] == WLAN_EID_NON_TX_BSSID_CAP || tmp_new[0] == WLAN_EID_SSID)) { memcpy(pos, tmp_new, tmp_new[1] + 2);