From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751915AbdIUIEU (ORCPT ); Thu, 21 Sep 2017 04:04:20 -0400 Received: from mail.linuxfoundation.org ([140.211.169.12]:60798 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751781AbdIUIET (ORCPT ); Thu, 21 Sep 2017 04:04:19 -0400 Date: Thu, 21 Sep 2017 10:04:28 +0200 From: Greg Kroah-Hartman To: Andrey Konovalov Cc: Jonathan Corbet , Mauro Carvalho Chehab , Jaejoong Kim , USB list , LKML , Dmitry Vyukov , Kostya Serebryany , syzkaller Subject: Re: usb/core: slab-out-of-bounds read in cdc_parse_cdc_header Message-ID: <20170921080428.GA31635@kroah.com> References: <20170921073154.GA11294@kroah.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20170921073154.GA11294@kroah.com> User-Agent: Mutt/1.9.0 (2017-09-02) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Sep 21, 2017 at 09:31:54AM +0200, Greg Kroah-Hartman wrote: > On Wed, Sep 20, 2017 at 04:45:08PM +0200, Andrey Konovalov wrote: > > Hi! > > > > I've got the following crash while fuzzing the kernel with syzkaller. > > > > On commit ebb2c2437d8008d46796902ff390653822af6cc4 (Sep 18). > > > > It looks like cdc_parse_cdc_header() doesn't validate buflen before > > accessing buffer[1], buffer[2] and so on. The only check present is > > while (buflen > 0). > > Ugh, you are right, let me go work on a patch, thanks for the report... Here's a first cut at a fix for this. I think this should solve it, but it's early and my coffee has not fully kicked in... thanks, greg k-h ----------------- diff --git a/drivers/usb/core/message.c b/drivers/usb/core/message.c index 4c38ea41ae96..028feaf01aa5 100644 --- a/drivers/usb/core/message.c +++ b/drivers/usb/core/message.c @@ -2069,6 +2069,10 @@ int cdc_parse_cdc_header(struct usb_cdc_parsed_header *hdr, elength = 1; goto next_desc; } + if ((buflen < elength) || (elength < 2)) { + dev_err(&intf->dev, "invalid descriptor buffer length\n"); + break; + } if (buffer[1] != USB_DT_CS_INTERFACE) { dev_err(&intf->dev, "skipping garbage\n"); goto next_desc;