Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp3755042pxv; Mon, 19 Jul 2021 08:02:21 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxtRtev65FmPCROKZMvnQgSlPMVJFdoLxOwChBnDhMEB6ebnsRqTmmeoK73ftzKgQpoWqdF X-Received: by 2002:a5e:8208:: with SMTP id l8mr19257436iom.197.1626706941352; Mon, 19 Jul 2021 08:02:21 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1626706941; cv=none; d=google.com; s=arc-20160816; b=EA0E+RcGy9DO3wF9XQf8yfd0WiJH5SrYtwDqGyIPHofZr6WOEPrc89lZXk6ypDVIVz EZV7tc9m8WQzmS45N4172f9GDSMMs6rjLITnMeQQTbNk9pFp8zrKt8poAQVVFS/f0eE7 8F3JDbj2MHQg6IIRB1nwm+mUUgsbJZBLJt1pnMjIp7U0wmc4bSZtA1I5yIcsI1ewcHed bY1BseVXE7Z9FjSj1jjmSGIWbHioxv7NOhk+5WOuebbNVvblOCIs/dzj/BrtIsazsSeZ NBwelAo+gHOW4mKhGA49RDzaSPmS2sS4k7x3SZbhtbVVaJRitWdnCzxkT74j+bKtEE5C 49eQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=jXrzHVb+0txxJPWMutNXge9cdonTfvsEzExvmbzdOTY=; b=jhNXqNu98L+piXyEuCSb3VaaXtxG62HjVZWrzRkBQqaNbRSFoEF+cmxXyNznssPlGl NRydtCz4uL0hAIduAwZloKOnNfbEUz93OgoSU3QRiJvoJCaqq6gK95fMPXRniYobwQk7 1JZlD4H9ckxEV6B16ROj83lUamg+tVxWGuXc5vYfWi0tBRZZ89lpXL+V6DqSVThtNNLF kHDI5SIno4R0yiIYAk+ekOMKCy2CQZxiT/rHzB2epI1950gFbUa81USTsCWbOiSVfYUs 9jK6ZhO+4f2qr8RdsM+y+tbyM5b/1RnVl6QOkLyvaQ8uNpCcbZUFUjg409GL1w8CI1BS XUiw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=Su0aZFM8; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id g5si18656845ilb.152.2021.07.19.08.02.08; Mon, 19 Jul 2021 08:02:21 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=Su0aZFM8; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S242841AbhGSOVJ (ORCPT + 99 others); Mon, 19 Jul 2021 10:21:09 -0400 Received: from mail.kernel.org ([198.145.29.99]:57286 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S242619AbhGSOUL (ORCPT ); Mon, 19 Jul 2021 10:20:11 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 98B2461073; Mon, 19 Jul 2021 15:00:49 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1626706850; bh=mMIS+Y5t42SGI2NUOoLIFM4/YIJr4m7BFnO3ggN34KQ=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Su0aZFM8jDhVMdmFNdutsRBQjKl2/0j+smW7g09nFfepoWigOPjI9kPOlwyH24jqf uVRWvxgIy25c7j369jX9Wc8IHrYEV/eMQ8NTp+dhnsDg68dr4I2spQXY03fmmYXfId ENKwSCY4eX86JIe3kf6QVh0dtVvHB/Lowcyw3ShE= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org, johannes@sipsolutions.net Cc: Greg Kroah-Hartman , stable@vger.kernel.org, "linux-wireless@vger.kernel.org, stable@vger.kernel.org, Davis Mosenkovs" , Davis Mosenkovs Subject: [PATCH 4.4 126/188] mac80211: fix memory corruption in EAPOL handling Date: Mon, 19 Jul 2021 16:51:50 +0200 Message-Id: <20210719144940.616512993@linuxfoundation.org> X-Mailer: git-send-email 2.32.0 In-Reply-To: <20210719144913.076563739@linuxfoundation.org> References: <20210719144913.076563739@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org From: Davis Mosenkovs Commit e3d4030498c3 ("mac80211: do not accept/forward invalid EAPOL frames") uses skb_mac_header() before eth_type_trans() is called leading to incorrect pointer, the pointer gets written to. This issue has appeared during backporting to 4.4, 4.9 and 4.14. Fixes: e3d4030498c3 ("mac80211: do not accept/forward invalid EAPOL frames") Link: https://lore.kernel.org/r/CAHQn7pKcyC_jYmGyTcPCdk9xxATwW5QPNph=bsZV8d-HPwNsyA@mail.gmail.com Cc: # 4.4.x Signed-off-by: Davis Mosenkovs Signed-off-by: Greg Kroah-Hartman --- net/mac80211/rx.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/net/mac80211/rx.c +++ b/net/mac80211/rx.c @@ -2234,7 +2234,7 @@ ieee80211_deliver_skb(struct ieee80211_r #endif if (skb) { - struct ethhdr *ehdr = (void *)skb_mac_header(skb); + struct ethhdr *ehdr = (struct ethhdr *)skb->data; /* deliver to local stack */ skb->protocol = eth_type_trans(skb, dev);