Received: by 2002:a05:6358:a55:b0:ec:fcf4:3ecf with SMTP id 21csp3087802rwb; Mon, 16 Jan 2023 03:38:35 -0800 (PST) X-Google-Smtp-Source: AMrXdXuswxJk3NgAyEcB1TATscioHpKjB/uOAa3/c51WKFJ/eK6q4bQjYUOeYORaAGI81/lI4Mz6 X-Received: by 2002:a17:902:7488:b0:194:67e5:3d07 with SMTP id h8-20020a170902748800b0019467e53d07mr14989850pll.53.1673869115607; Mon, 16 Jan 2023 03:38:35 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1673869115; cv=none; d=google.com; s=arc-20160816; b=aWJdTPj0UeGViPrCw/wdr2w126bOzW7edJJn/SvjkG9UrTny8GZRyeHSKNQpYDHJMi VPnC1mdm3QUmuSKWrPG529N4sYtMcL0xphj+FMxv1hOGsN2D8FNxaA/AzyAfbgzohadP UantLOL5bH83ztVKtiTGfDgyKteDvkV/NBfAJ2XhbvfPU+hbIO4hdcqGSxnfWIbGglGU w86ccFh7H1utmZFvPbNQBsMl6tq0i6Dxa+8ccOl1fihV9x4ceEbIARAYcVMq/dUHkhyU YG6f4YT13H6il60kTu6IeUah3y+y5yRn1O2+gNR2L8nIgxifMOIN+R53W0/BgTm4xhBv T5Yw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:date:message-id:user-agent:cc:to:references :in-reply-to:from:subject:content-transfer-encoding:mime-version :dkim-signature; bh=34Nps6/t4akJG5Wnvoc2rEvb5j0sqE1Dm1C2toMeJwc=; b=ZW0zKVlWKq5aS0q+zH4WVlb3jE70FrsGg5Myp4bToBWAQEdCqdHu5mKOoocqJTqi3J p1dYm2N0brAbqnG1DuhYZC29swwRjB4qrbSW/WUWHh3E+JFKdsNf0H9gfDKw7L1ReUY+ IuyBHTGGPuG/IF/5zbpZvWX+PX7TwDeBz+E0Nz90TFTIDnHh1jikF+935m+RX2PpefT5 5ppFFP6YECg6vsqJcvOEwrNg1pRrnxV0FP5tgnTtPOkskddVPBEbXGX9Id+G73oED0jO 5wklpArFgBe9mrXfvynfJc0sTSRQr+SHQclOwPyt5c9uQyA/Pqp+L7KBcsZIpML4ral1 0udA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=aosC56xL; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id a9-20020a170902900900b00189c2cc82cfsi27090173plp.367.2023.01.16.03.38.28; Mon, 16 Jan 2023 03:38:35 -0800 (PST) Received-SPF: pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=aosC56xL; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230160AbjAPL3L (ORCPT + 63 others); Mon, 16 Jan 2023 06:29:11 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:52866 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230347AbjAPL2m (ORCPT ); Mon, 16 Jan 2023 06:28:42 -0500 Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 5AA8B1F5D0; Mon, 16 Jan 2023 03:28:41 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 1527CB80E59; Mon, 16 Jan 2023 11:28:40 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 4E02FC433D2; Mon, 16 Jan 2023 11:28:36 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1673868518; bh=m8r+MA8M9SSTC6lPE34HeHkrHNMpB1WU90h6CeoFNkM=; h=Subject:From:In-Reply-To:References:To:Cc:Date:From; b=aosC56xLVELNoaaT32vZpAaADbjkcp3GKCBZapKF/pycro35XRHMSl2Q33jtK6W3g qXLDOhYSAm3gpRpfk0bOstzJYTbzXillz6DjTKV1MbS7wQuOfKpz/Gv5osjIu0XbJW irkK4MR9dsntQTN1di3Pc4znIDUVWaWOvuNd9ge5ege1e8BNEEErlH9SLRL7T3QXKK xdB34hEPOh0N9gXEsOt/V230tUYFmiEPwiUjFB7So+geFCBL2gA8skywj37VnMX7T3 fatS4s3IXYyAlMpG2w0ecAZtJsh08KMlCZTo4keHrD0OrOr3BDJ83/avGkQJ91DST5 0ChW7DdbjNczw== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Subject: Re: [v2] wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid From: Kalle Valo In-Reply-To: <20230111175031.7049-1-szymon.heidrich@gmail.com> References: <20230111175031.7049-1-szymon.heidrich@gmail.com> To: Szymon Heidrich Cc: alexander.duyck@gmail.com, jussi.kivilinna@iki.fi, davem@davemloft.net, edumazet@google.com, kuba@kernel.org, pabeni@redhat.com, greg@kroah.com, szymon.heidrich@gmail.com, linux-wireless@vger.kernel.org, netdev@vger.kernel.org, linux-kernel@vger.kernel.org User-Agent: pwcli/0.1.1-git (https://github.com/kvalo/pwcli/) Python/3.7.3 Message-ID: <167386851260.4736.15589868061067872069.kvalo@kernel.org> Date: Mon, 16 Jan 2023 11:28:36 +0000 (UTC) X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org Szymon Heidrich wrote: > Since resplen and respoffs are signed integers sufficiently > large values of unsigned int len and offset members of RNDIS > response will result in negative values of prior variables. > This may be utilized to bypass implemented security checks > to either extract memory contents by manipulating offset or > overflow the data buffer via memcpy by manipulating both > offset and len. > > Additionally assure that sum of resplen and respoffs does not > overflow so buffer boundaries are kept. > > Fixes: 80f8c5b434f9 ("rndis_wlan: copy only useful data from rndis_command respond") > Signed-off-by: Szymon Heidrich > Reviewed-by: Alexander Duyck Patch applied to wireless.git, thanks. b870e73a56c4 wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid -- https://patchwork.kernel.org/project/linux-wireless/patch/20230111175031.7049-1-szymon.heidrich@gmail.com/ https://wireless.wiki.kernel.org/en/developers/documentation/submittingpatches