NFC: Prevent multiple buffer overflows in NCI
Fix multiple remotely-exploitable stack-based buffer overflows due to the NCI code pulling length fields directly from incoming frames and copying too much data into statically-sized arrays. Signed-off-by: Dan Rosenberg <dan.j.rosenberg@gmail.com> Cc: stable@kernel.org Cc: security@kernel.org Cc: Lauro Ramos Venancio <lauro.venancio@openbossa.org> Cc: Aloisio Almeida Jr <aloisio.almeida@openbossa.org> Cc: Samuel Ortiz <sameo@linux.intel.com> Cc: David S. Miller <davem@davemloft.net> Acked-by: Ilan Elias <ilane@ti.com> Signed-off-by: Samuel Ortiz <sameo@linux.intel.com>
This commit is contained in:
parent
8311f0da95
commit
67de956ff5
@ -106,7 +106,7 @@ static __u8 *nci_extract_rf_params_nfca_passive_poll(struct nci_dev *ndev,
|
|||||||
nfca_poll->sens_res = __le16_to_cpu(*((__u16 *)data));
|
nfca_poll->sens_res = __le16_to_cpu(*((__u16 *)data));
|
||||||
data += 2;
|
data += 2;
|
||||||
|
|
||||||
nfca_poll->nfcid1_len = *data++;
|
nfca_poll->nfcid1_len = min_t(__u8, *data++, NFC_NFCID1_MAXSIZE);
|
||||||
|
|
||||||
pr_debug("sens_res 0x%x, nfcid1_len %d\n",
|
pr_debug("sens_res 0x%x, nfcid1_len %d\n",
|
||||||
nfca_poll->sens_res, nfca_poll->nfcid1_len);
|
nfca_poll->sens_res, nfca_poll->nfcid1_len);
|
||||||
@ -130,7 +130,7 @@ static __u8 *nci_extract_rf_params_nfcb_passive_poll(struct nci_dev *ndev,
|
|||||||
struct rf_tech_specific_params_nfcb_poll *nfcb_poll,
|
struct rf_tech_specific_params_nfcb_poll *nfcb_poll,
|
||||||
__u8 *data)
|
__u8 *data)
|
||||||
{
|
{
|
||||||
nfcb_poll->sensb_res_len = *data++;
|
nfcb_poll->sensb_res_len = min_t(__u8, *data++, NFC_SENSB_RES_MAXSIZE);
|
||||||
|
|
||||||
pr_debug("sensb_res_len %d\n", nfcb_poll->sensb_res_len);
|
pr_debug("sensb_res_len %d\n", nfcb_poll->sensb_res_len);
|
||||||
|
|
||||||
@ -145,7 +145,7 @@ static __u8 *nci_extract_rf_params_nfcf_passive_poll(struct nci_dev *ndev,
|
|||||||
__u8 *data)
|
__u8 *data)
|
||||||
{
|
{
|
||||||
nfcf_poll->bit_rate = *data++;
|
nfcf_poll->bit_rate = *data++;
|
||||||
nfcf_poll->sensf_res_len = *data++;
|
nfcf_poll->sensf_res_len = min_t(__u8, *data++, NFC_SENSF_RES_MAXSIZE);
|
||||||
|
|
||||||
pr_debug("bit_rate %d, sensf_res_len %d\n",
|
pr_debug("bit_rate %d, sensf_res_len %d\n",
|
||||||
nfcf_poll->bit_rate, nfcf_poll->sensf_res_len);
|
nfcf_poll->bit_rate, nfcf_poll->sensf_res_len);
|
||||||
@ -331,7 +331,7 @@ static int nci_extract_activation_params_iso_dep(struct nci_dev *ndev,
|
|||||||
switch (ntf->activation_rf_tech_and_mode) {
|
switch (ntf->activation_rf_tech_and_mode) {
|
||||||
case NCI_NFC_A_PASSIVE_POLL_MODE:
|
case NCI_NFC_A_PASSIVE_POLL_MODE:
|
||||||
nfca_poll = &ntf->activation_params.nfca_poll_iso_dep;
|
nfca_poll = &ntf->activation_params.nfca_poll_iso_dep;
|
||||||
nfca_poll->rats_res_len = *data++;
|
nfca_poll->rats_res_len = min_t(__u8, *data++, 20);
|
||||||
pr_debug("rats_res_len %d\n", nfca_poll->rats_res_len);
|
pr_debug("rats_res_len %d\n", nfca_poll->rats_res_len);
|
||||||
if (nfca_poll->rats_res_len > 0) {
|
if (nfca_poll->rats_res_len > 0) {
|
||||||
memcpy(nfca_poll->rats_res,
|
memcpy(nfca_poll->rats_res,
|
||||||
@ -341,7 +341,7 @@ static int nci_extract_activation_params_iso_dep(struct nci_dev *ndev,
|
|||||||
|
|
||||||
case NCI_NFC_B_PASSIVE_POLL_MODE:
|
case NCI_NFC_B_PASSIVE_POLL_MODE:
|
||||||
nfcb_poll = &ntf->activation_params.nfcb_poll_iso_dep;
|
nfcb_poll = &ntf->activation_params.nfcb_poll_iso_dep;
|
||||||
nfcb_poll->attrib_res_len = *data++;
|
nfcb_poll->attrib_res_len = min_t(__u8, *data++, 50);
|
||||||
pr_debug("attrib_res_len %d\n", nfcb_poll->attrib_res_len);
|
pr_debug("attrib_res_len %d\n", nfcb_poll->attrib_res_len);
|
||||||
if (nfcb_poll->attrib_res_len > 0) {
|
if (nfcb_poll->attrib_res_len > 0) {
|
||||||
memcpy(nfcb_poll->attrib_res,
|
memcpy(nfcb_poll->attrib_res,
|
||||||
|
Loading…
x
Reference in New Issue
Block a user