projects
/
linux.git
/ commitdiff
commit
grep
author
committer
pickaxe
?
search:
re
summary
|
shortlog
|
log
|
commit
| commitdiff |
tree
raw
|
patch
| inline |
side by side
(parent:
3056af1
)
ca8210: fix mac_len negative array access
author
Alexander Aring
<aahringo@redhat.com>
Fri, 17 Feb 2023 04:25:04 +0000
(23:25 -0500)
committer
Greg Kroah-Hartman
<gregkh@linuxfoundation.org>
Thu, 30 Mar 2023 10:47:53 +0000
(12:47 +0200)
[ Upstream commit
6c993779ea1d0cccdb3a5d7d45446dd229e610a3
]
This patch fixes a buffer overflow access of skb->data if
ieee802154_hdr_peek_addrs() fails.
Reported-by: lianhui tang <bluetlh@gmail.com>
Signed-off-by: Alexander Aring <aahringo@redhat.com>
Link:
https://lore.kernel.org/r/20230217042504.3303396-1-aahringo@redhat.com
Signed-off-by: Stefan Schmidt <stefan@datenfreihafen.org>
Signed-off-by: Sasha Levin <sashal@kernel.org>
drivers/net/ieee802154/ca8210.c
patch
|
blob
|
history
diff --git
a/drivers/net/ieee802154/ca8210.c
b/drivers/net/ieee802154/ca8210.c
index 0362917fce7a93c728f83cf8ea6f2c84d59cc7db..e2322bc3a4e9a6b29214b157ef92ee38ac90ef57 100644
(file)
--- a/
drivers/net/ieee802154/ca8210.c
+++ b/
drivers/net/ieee802154/ca8210.c
@@
-1956,6
+1956,8
@@
static int ca8210_skb_tx(
* packet
*/
mac_len = ieee802154_hdr_peek_addrs(skb, &header);
+ if (mac_len < 0)
+ return mac_len;
secspec.security_level = header.sec.level;
secspec.key_id_mode = header.sec.key_id_mode;