[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <167386851260.4736.15589868061067872069.kvalo@kernel.org>
Date: Mon, 16 Jan 2023 11:28:36 +0000 (UTC)
From: Kalle Valo <kvalo@...nel.org>
To: Szymon Heidrich <szymon.heidrich@...il.com>
Cc: alexander.duyck@...il.com, jussi.kivilinna@....fi,
davem@...emloft.net, edumazet@...gle.com, kuba@...nel.org,
pabeni@...hat.com, greg@...ah.com, szymon.heidrich@...il.com,
linux-wireless@...r.kernel.org, netdev@...r.kernel.org,
linux-kernel@...r.kernel.org
Subject: Re: [v2] wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid
Szymon Heidrich <szymon.heidrich@...il.com> wrote:
> Since resplen and respoffs are signed integers sufficiently
> large values of unsigned int len and offset members of RNDIS
> response will result in negative values of prior variables.
> This may be utilized to bypass implemented security checks
> to either extract memory contents by manipulating offset or
> overflow the data buffer via memcpy by manipulating both
> offset and len.
>
> Additionally assure that sum of resplen and respoffs does not
> overflow so buffer boundaries are kept.
>
> Fixes: 80f8c5b434f9 ("rndis_wlan: copy only useful data from rndis_command respond")
> Signed-off-by: Szymon Heidrich <szymon.heidrich@...il.com>
> Reviewed-by: Alexander Duyck <alexanderduyck@...com>
Patch applied to wireless.git, thanks.
b870e73a56c4 wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid
--
https://patchwork.kernel.org/project/linux-wireless/patch/20230111175031.7049-1-szymon.heidrich@gmail.com/
https://wireless.wiki.kernel.org/en/developers/documentation/submittingpatches
Powered by blists - more mailing lists