Prechádzať zdrojové kódy

qcacld-3.0: Avoid info leak in spectral scan handler

In __spectral_scan_msg_handler(), payload section of input data is
type casted to driver internal structure spectral_scan_msg without
validating payload length which can lead to kernel info leak
if the payload length is less than size of spectral_scan_msg.

To fix this, avoid type-cast and return error if payload length is
less than size of spectral_scan_msg.

Change-Id: Ie7e74cc2cdcf8136582e81ffc3a088fd5a881dc9
CRs-Fixed: 2468493
Rajeev Kumar Sirasanagandla 5 rokov pred
rodič
commit
00b95b1569
1 zmenil súbory, kde vykonal 11 pridanie a 1 odobranie
  1. 11 1
      core/hdd/src/wlan_hdd_spectralscan.c

+ 11 - 1
core/hdd/src/wlan_hdd_spectralscan.c

@@ -447,7 +447,7 @@ static void __spectral_scan_msg_handler(const void *data, int data_len,
 					void *ctx, int pid)
 {
 	struct spectral_scan_msg *ss_msg = NULL;
-	struct nlattr *tb[QCA_WLAN_VENDOR_ATTR_MAX + 1];
+	struct nlattr *tb[CLD80211_ATTR_MAX + 1];
 	struct hdd_context *hdd_ctx;
 	int ret;
 
@@ -456,6 +456,10 @@ static void __spectral_scan_msg_handler(const void *data, int data_len,
 	if (ret)
 		return;
 
+	/*
+	 * audit note: it is ok to pass a NULL policy here since only
+	 * one attribute is parsed and it is explicitly validated
+	 */
 	if (wlan_cfg80211_nla_parse(tb, CLD80211_ATTR_MAX, data,
 				    data_len, NULL)) {
 		hdd_err("nla parse fails");
@@ -466,6 +470,12 @@ static void __spectral_scan_msg_handler(const void *data, int data_len,
 		hdd_err("attr VENDOR_DATA fails");
 		return;
 	}
+
+	if (nla_len(tb[CLD80211_ATTR_DATA]) < sizeof(*ss_msg)) {
+		hdd_err_rl("Invalid length for ATTR_DATA");
+		return;
+	}
+
 	ss_msg = (struct spectral_scan_msg *)nla_data(tb[CLD80211_ATTR_DATA]);
 
 	if (!ss_msg) {