From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id DECA02BE058; Tue, 26 Aug 2025 14:16:58 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1756217819; cv=none; b=eu+1gdeiQnTjzGe68yH+SVFKgPVy43J5avFmPlPwTI95PEvpoXzmRFrgmrj6gFBMYEG2MoQ1IIZLlmXn3cU1/qapWwJcn2hhA6XOXa6gWohQ6tvor7wht98z/iqnvZk2d3yTPNCp64wxa17TTqFCIKbzcS4VyWRHxJJpbEGnxnw= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1756217819; c=relaxed/simple; bh=iAOUhJv6k2j6lyt0ETT6FMkIXTZCY9XgKLwWOuONuTo=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=Z3mICY234Mg9IVT34GvxdKKgdht7ZeBchnxs6oEXZefduDX34OILIEbOHekYMESyPhuVXslHTb33vbkfP5EVTKNyacpMYb0H5wRIcUYVHlA/Hf1SY6J+hLaZtb1hN5j6r/foGFbtqyYDpgoSdVlXE5tE79yOJmPdXiUAoYzHAIE= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b=FRNev73f; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b="FRNev73f" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 6F64FC113CF; Tue, 26 Aug 2025 14:16:58 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1756217818; bh=iAOUhJv6k2j6lyt0ETT6FMkIXTZCY9XgKLwWOuONuTo=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=FRNev73fqPHjfZYgCPKj39eKdQfdL44cFb+iv3RNDhmlhSsoXZ6eudy4i7+wa9TjR YK62veVUqLicifeIqYVxRgDBq2fr7mjOACjYinJHV2DCcKEmKceezoGDJ1Zf8iO0ZB gE7yTFV+F/+j+S7y36KYmXRSDzj7CQfrrMfhbNeE= From: Greg Kroah-Hartman To: stable@vger.kernel.org Cc: Greg Kroah-Hartman , patches@lists.linux.dev, Hari Kalavakunta , Paul Fertser , Jakub Kicinski , Sasha Levin Subject: [PATCH 5.10 286/523] net: ncsi: Fix buffer overflow in fetching version id Date: Tue, 26 Aug 2025 13:08:16 +0200 Message-ID: <20250826110931.496474230@linuxfoundation.org> X-Mailer: git-send-email 2.50.1 In-Reply-To: <20250826110924.562212281@linuxfoundation.org> References: <20250826110924.562212281@linuxfoundation.org> User-Agent: quilt/0.68 X-stable: review X-Patchwork-Hint: ignore Precedence: bulk X-Mailing-List: patches@lists.linux.dev List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit 5.10-stable review patch. If anyone has any objections, please let me know. ------------------ From: Hari Kalavakunta [ Upstream commit 8e16170ae972c7fed132bc928914a2ffb94690fc ] In NC-SI spec v1.2 section 8.4.44.2, the firmware name doesn't need to be null terminated while its size occupies the full size of the field. Fix the buffer overflow issue by adding one additional byte for null terminator. Signed-off-by: Hari Kalavakunta Reviewed-by: Paul Fertser Link: https://patch.msgid.link/20250610193338.1368-1-kalavakunta.hari.prasad@gmail.com Signed-off-by: Jakub Kicinski Signed-off-by: Sasha Levin --- net/ncsi/internal.h | 2 +- net/ncsi/ncsi-rsp.c | 1 + 2 files changed, 2 insertions(+), 1 deletion(-) diff --git a/net/ncsi/internal.h b/net/ncsi/internal.h index c61d2e2e93ad..6ebf9e55c046 100644 --- a/net/ncsi/internal.h +++ b/net/ncsi/internal.h @@ -107,7 +107,7 @@ struct ncsi_channel_version { u8 update; /* NCSI version update */ char alpha1; /* NCSI version alpha1 */ char alpha2; /* NCSI version alpha2 */ - u8 fw_name[12]; /* Firmware name string */ + u8 fw_name[12 + 1]; /* Firmware name string */ u32 fw_version; /* Firmware version */ u16 pci_ids[4]; /* PCI identification */ u32 mf_id; /* Manufacture ID */ diff --git a/net/ncsi/ncsi-rsp.c b/net/ncsi/ncsi-rsp.c index 88fb86cf7b20..c1d42bbfdc7e 100644 --- a/net/ncsi/ncsi-rsp.c +++ b/net/ncsi/ncsi-rsp.c @@ -782,6 +782,7 @@ static int ncsi_rsp_handler_gvi(struct ncsi_request *nr) ncv->alpha1 = rsp->alpha1; ncv->alpha2 = rsp->alpha2; memcpy(ncv->fw_name, rsp->fw_name, 12); + ncv->fw_name[12] = '\0'; ncv->fw_version = ntohl(rsp->fw_version); for (i = 0; i < ARRAY_SIZE(ncv->pci_ids); i++) ncv->pci_ids[i] = ntohs(rsp->pci_ids[i]); -- 2.39.5