]> git.proxmox.com Git - mirror_ubuntu-focal-kernel.git/commit
net: qrtr: fix OOB Read in qrtr_endpoint_post
authorPavel Skripkin <paskripkin@gmail.com>
Mon, 14 Jun 2021 12:06:50 +0000 (15:06 +0300)
committerKleber Sacilotto de Souza <kleber.souza@canonical.com>
Thu, 15 Jul 2021 17:27:38 +0000 (19:27 +0200)
commit73209bb4f25175b4fa5a244822679a7ad3d1d0b9
tree6a19253f302cb4e8f6c38015670f40b753f10c54
parentceefd782104fde48f436e3b736f11c25a009299d
net: qrtr: fix OOB Read in qrtr_endpoint_post

BugLink: https://bugs.launchpad.net/bugs/1934179
[ Upstream commit ad9d24c9429e2159d1e279dc3a83191ccb4daf1d ]

Syzbot reported slab-out-of-bounds Read in
qrtr_endpoint_post. The problem was in wrong
_size_ type:

if (len != ALIGN(size, 4) + hdrlen)
goto err;

If size from qrtr_hdr is 4294967293 (0xfffffffd), the result of
ALIGN(size, 4) will be 0. In case of len == hdrlen and size == 4294967293
in header this check won't fail and

skb_put_data(skb, data + hdrlen, size);

will read out of bound from data, which is hdrlen allocated block.

Fixes: 194ccc88297a ("net: qrtr: Support decoding incoming v2 packets")
Reported-and-tested-by: syzbot+1917d778024161609247@syzkaller.appspotmail.com
Signed-off-by: Pavel Skripkin <paskripkin@gmail.com>
Reviewed-by: Bjorn Andersson <bjorn.andersson@linaro.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
Signed-off-by: Sasha Levin <sashal@kernel.org>
Signed-off-by: Kamal Mostafa <kamal@canonical.com>
Signed-off-by: Kleber Sacilotto de Souza <kleber.souza@canonical.com>
net/qrtr/qrtr.c