[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <2025093055-awoke-facedown-64d5@gregkh>
Date: Tue, 30 Sep 2025 15:56:39 +0200
From: Greg KH <gregkh@...uxfoundation.org>
To: Dan Carpenter <dan.carpenter@...aro.org>
Cc: David Brownell <david-b@...bell.net>,
Andrew Lunn <andrew+netdev@...n.ch>,
"David S. Miller" <davem@...emloft.net>,
Eric Dumazet <edumazet@...gle.com>,
Jakub Kicinski <kuba@...nel.org>, Paolo Abeni <pabeni@...hat.com>,
Lubomir Rintel <lkundrak@...sk>,
Christian Heusel <christian@...sel.eu>,
Greg Kroah-Hartman <gregkh@...e.de>, linux-usb@...r.kernel.org,
netdev@...r.kernel.org, linux-kernel@...r.kernel.org,
kernel-janitors@...r.kernel.org
Subject: Re: [PATCH net] rndis_host: Check for integer overflows in
rndis_rx_fixup()
On Tue, Sep 30, 2025 at 03:35:19PM +0300, Dan Carpenter wrote:
> The "data_offset" and "data_len" values come from received skb->data so
> we don't trust them. They are u32 types. Check that the "data_offset +
> data_len + 8" addition does not have an integer overflow.
>
> Fixes: 64e049102d3d ("[PATCH] USB: usbnet (8/9) module for RNDIS devices")
> Signed-off-by: Dan Carpenter <dan.carpenter@...aro.org>
> ---
> drivers/net/usb/rndis_host.c | 5 +++--
> 1 file changed, 3 insertions(+), 2 deletions(-)
David has passed away many years ago, odd that this was sent to him
given that get_maintainers.pl doesn't show it :(
> diff --git a/drivers/net/usb/rndis_host.c b/drivers/net/usb/rndis_host.c
> index 7b3739b29c8f..913aca6ff434 100644
> --- a/drivers/net/usb/rndis_host.c
> +++ b/drivers/net/usb/rndis_host.c
> @@ -513,8 +513,9 @@ int rndis_rx_fixup(struct usbnet *dev, struct sk_buff *skb)
> data_len = le32_to_cpu(hdr->data_len);
>
> /* don't choke if we see oob, per-packet data, etc */
> - if (unlikely(msg_type != RNDIS_MSG_PACKET || skb->len < msg_len
> - || (data_offset + data_len + 8) > msg_len)) {
> + if (unlikely(msg_type != RNDIS_MSG_PACKET || skb->len < msg_len ||
> + size_add(data_offset, data_len) > U32_MAX - 8 ||
> + (data_offset + data_len + 8) > msg_len)) {
Nice, I missed this in my old audit of this code (there's still lots of
other types of these bugs in this codebase, remember the rndis standard
says "there is no security", and should never be used by untrusted
devices.)
But will this work? If size_add(x, y) wraps, it will return SIZE_MAX,
which we hope is bigger than (U32_MAX - 8)? That feels fragile.
Then we do:
skb_pull(skb, 8 + data_offset);
so if data_offset was huge, that doesn't really do anything, and then we
treat data_len independent of data_offset. So even if that check
overflowed, I don't think anything "real" will happen here except a
packet is dropped.
or am I missing something elsewhere in this function?
thanks,
greg k-h
Powered by blists - more mailing lists