]> git.ipfire.org Git - thirdparty/kernel/stable-queue.git/blame - releases/4.4.29/brcmfmac-avoid-potential-stack-overflow-in-brcmf_cfg80211_start_ap.patch
5.1-stable patches
[thirdparty/kernel/stable-queue.git] / releases / 4.4.29 / brcmfmac-avoid-potential-stack-overflow-in-brcmf_cfg80211_start_ap.patch
CommitLineData
4227f6b8
GKH
1From ded89912156b1a47d940a0c954c43afbabd0c42c Mon Sep 17 00:00:00 2001
2From: Arend Van Spriel <arend.vanspriel@broadcom.com>
3Date: Mon, 5 Sep 2016 10:45:47 +0100
4Subject: brcmfmac: avoid potential stack overflow in brcmf_cfg80211_start_ap()
5
6From: Arend Van Spriel <arend.vanspriel@broadcom.com>
7
8commit ded89912156b1a47d940a0c954c43afbabd0c42c upstream.
9
10User-space can choose to omit NL80211_ATTR_SSID and only provide raw
11IE TLV data. When doing so it can provide SSID IE with length exceeding
12the allowed size. The driver further processes this IE copying it
13into a local variable without checking the length. Hence stack can be
14corrupted and used as exploit.
15
16Reported-by: Daxing Guo <freener.gdx@gmail.com>
17Reviewed-by: Hante Meuleman <hante.meuleman@broadcom.com>
18Reviewed-by: Pieter-Paul Giesberts <pieter-paul.giesberts@broadcom.com>
19Reviewed-by: Franky Lin <franky.lin@broadcom.com>
20Signed-off-by: Arend van Spriel <arend.vanspriel@broadcom.com>
21Signed-off-by: Kalle Valo <kvalo@codeaurora.org>
22Signed-off-by: Juerg Haefliger <juerg.haefliger@hpe.com>
23Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
24
25---
26 drivers/net/wireless/brcm80211/brcmfmac/cfg80211.c | 2 +-
27 1 file changed, 1 insertion(+), 1 deletion(-)
28
29--- a/drivers/net/wireless/brcm80211/brcmfmac/cfg80211.c
30+++ b/drivers/net/wireless/brcm80211/brcmfmac/cfg80211.c
31@@ -4102,7 +4102,7 @@ brcmf_cfg80211_start_ap(struct wiphy *wi
32 (u8 *)&settings->beacon.head[ie_offset],
33 settings->beacon.head_len - ie_offset,
34 WLAN_EID_SSID);
35- if (!ssid_ie)
36+ if (!ssid_ie || ssid_ie->len > IEEE80211_MAX_SSID_LEN)
37 return -EINVAL;
38
39 memcpy(ssid_le.SSID, ssid_ie->data, ssid_ie->len);