lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 13 Dec 2022 09:12:28 -0500 From: Aleksandr Burakov <a.burakov@...alinux.ru> To: Krzysztof Kozlowski <krzysztof.kozlowski@...aro.org>, Christophe Ricard <christophe.ricard@...il.com>, Samuel Ortiz <sameo@...ux.intel.com> Cc: Aleksandr Burakov <a.burakov@...alinux.ru>, netdev@...r.kernel.org, linux-kernel@...r.kernel.org, lvc-project@...uxtesting.org Subject: [PATCH] nfc: st-nci: array index overflow in st_nci_se_get_bwi() Index of info->se_info.atr can be overflow due to unchecked increment in the loop "for". The patch checks the value of current array index and doesn't permit increment in case of the index is equal to ST_NCI_ESE_MAX_LENGTH - 1. Found by Linux Verification Center (linuxtesting.org) with SVACE. Fixes: ed06aeefdac3 ("nfc: st-nci: Rename st21nfcb to st-nci") Signed-off-by: Aleksandr Burakov <a.burakov@...alinux.ru> --- drivers/nfc/st-nci/se.c | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/drivers/nfc/st-nci/se.c b/drivers/nfc/st-nci/se.c index ec87dd21e054..ff8ac1784880 100644 --- a/drivers/nfc/st-nci/se.c +++ b/drivers/nfc/st-nci/se.c @@ -119,10 +119,11 @@ static u8 st_nci_se_get_bwi(struct nci_dev *ndev) /* Bits 8 to 5 of the first TB for T=1 encode BWI from zero to nine */ for (i = 1; i < ST_NCI_ESE_MAX_LENGTH; i++) { td = ST_NCI_ATR_GET_Y_FROM_TD(info->se_info.atr[i]); - if (ST_NCI_ATR_TA_PRESENT(td)) + if (ST_NCI_ATR_TA_PRESENT(td) && i < ST_NCI_ESE_MAX_LENGTH - 1) i++; if (ST_NCI_ATR_TB_PRESENT(td)) { - i++; + if (i < ST_NCI_ESE_MAX_LENGTH - 1) + i++; return info->se_info.atr[i] >> 4; } } -- 2.35.1
Powered by blists - more mailing lists