aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorAlexander Aring <aahringo@redhat.com>2023-02-16 23:25:04 -0500
committerStefan Schmidt <stefan@datenfreihafen.org>2023-02-18 16:21:49 +0100
commit845d63c86fea02d5acb991ac8acb5bf240e6b793 (patch)
tree95e633fd344d57118f7d4011eee0252080d71d9d
parentde5ca4c3852f896cacac2bf259597aab5e17d9e3 (diff)
downloadwpan-master.tar.gz
ca8210: fix mac_len negative array accessHEADmaster
This patch fixes a buffer overflow access of skb->data if ieee802154_hdr_peek_addrs() fails. Reported-by: lianhui tang <bluetlh@gmail.com> Signed-off-by: Alexander Aring <aahringo@redhat.com> Link: https://lore.kernel.org/r/20230217042504.3303396-1-aahringo@redhat.com Signed-off-by: Stefan Schmidt <stefan@datenfreihafen.org>
-rw-r--r--drivers/net/ieee802154/ca8210.c2
1 files changed, 2 insertions, 0 deletions
diff --git a/drivers/net/ieee802154/ca8210.c b/drivers/net/ieee802154/ca8210.c
index e1a569b99e4a6a..0b0c6c0764fe9c 100644
--- a/drivers/net/ieee802154/ca8210.c
+++ b/drivers/net/ieee802154/ca8210.c
@@ -1913,6 +1913,8 @@ static int ca8210_skb_tx(
* packet
*/
mac_len = ieee802154_hdr_peek_addrs(skb, &header);
+ if (mac_len < 0)
+ return mac_len;
secspec.security_level = header.sec.level;
secspec.key_id_mode = header.sec.key_id_mode;