]> git.ipfire.org Git - thirdparty/kernel/linux.git/commitdiff
batman-adv: reject oversized global TT response buffers
authorRuide Cao <caoruide123@gmail.com>
Thu, 2 Apr 2026 15:12:31 +0000 (23:12 +0800)
committerSimon Wunderlich <sw@simonwunderlich.de>
Thu, 2 Apr 2026 15:32:55 +0000 (17:32 +0200)
batadv_tt_prepare_tvlv_global_data() builds the allocation length for a
global TT response in 16-bit temporaries. When a remote originator
advertises a large enough global TT, the TT payload length plus the VLAN
header offset can exceed 65535 and wrap before kmalloc().

The full-table response path still uses the original TT payload length when
it fills tt_change, so the wrapped allocation is too small and
batadv_tt_prepare_tvlv_global_data() writes past the end of the heap object
before the later packet-size check runs.

Fix this by rejecting TT responses whose TVLV value length cannot fit in
the 16-bit TVLV payload length field.

Fixes: 7ea7b4a14275 ("batman-adv: make the TT CRC logic VLAN specific")
Cc: stable@vger.kernel.org
Reported-by: Yifan Wu <yifanwucs@gmail.com>
Reported-by: Juefei Pu <tomapufckgml@gmail.com>
Co-developed-by: Yuan Tan <yuantan098@gmail.com>
Signed-off-by: Yuan Tan <yuantan098@gmail.com>
Suggested-by: Xin Liu <bird@lzu.edu.cn>
Tested-by: Ren Wei <enjou1224z@gmail.com>
Signed-off-by: Ruide Cao <caoruide123@gmail.com>
Signed-off-by: Ren Wei <n05ec@lzu.edu.cn>
Signed-off-by: Sven Eckelmann <sven@narfation.org>
Signed-off-by: Simon Wunderlich <sw@simonwunderlich.de>
net/batman-adv/translation-table.c

index 6e95e883c2bf08dd82a56673380aa1bfd98735ea..05cddcf994f651d6137602d989fbf18442fa150b 100644 (file)
@@ -798,8 +798,8 @@ batadv_tt_prepare_tvlv_global_data(struct batadv_orig_node *orig_node,
 {
        u16 num_vlan = 0;
        u16 num_entries = 0;
-       u16 change_offset;
-       u16 tvlv_len;
+       u16 tvlv_len = 0;
+       unsigned int change_offset;
        struct batadv_tvlv_tt_vlan_data *tt_vlan;
        struct batadv_orig_node_vlan *vlan;
        u8 *tt_change_ptr;
@@ -816,6 +816,11 @@ batadv_tt_prepare_tvlv_global_data(struct batadv_orig_node *orig_node,
        if (*tt_len < 0)
                *tt_len = batadv_tt_len(num_entries);
 
+       if (change_offset > U16_MAX || *tt_len > U16_MAX - change_offset) {
+               *tt_len = 0;
+               goto out;
+       }
+
        tvlv_len = *tt_len;
        tvlv_len += change_offset;