linux-wireless.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Thomas Pedersen <thomas@cozybit.com>
To: Johannes Berg <johannes@sipsolutions.net>
Cc: linux-wireless@vger.kernel.org, Johannes Berg <johannes.berg@intel.com>
Subject: Re: [PATCH 2/3] mac80211: verify that skb data is present
Date: Thu, 25 Oct 2012 17:57:48 -0700	[thread overview]
Message-ID: <20121026005748.GA30982@shredder> (raw)
In-Reply-To: <20121025235816.GE20609@shredder>

On Thu, Oct 25, 2012 at 04:58:16PM -0700, Thomas Pedersen wrote:
> On Thu, Oct 25, 2012 at 04:05:05PM -0700, Thomas Pedersen wrote:
> > On Fri, Oct 26, 2012 at 12:46:39AM +0200, Johannes Berg wrote:
> > > From: Johannes Berg <johannes.berg@intel.com>
> > > 
> > > A number of places in the mesh code don't check that
> > > the frame data is present and in the skb header when
> > > trying to access. Add those checks and the necessary
> > > pskb_may_pull() calls. This prevents accessing data
> > > that doesn't actually exist.
> > > 
> > > To do this, export ieee80211_get_mesh_hdrlen() to be
> > > able to use it in mac80211.
> > > 
> > > Cc: stable@vger.kernel.org
> > > Signed-off-by: Johannes Berg <johannes.berg@intel.com>
> > > ---
> > >  include/net/cfg80211.h |    9 +++++++++
> > >  net/mac80211/rx.c      |   43 +++++++++++++++++++++++++++++++++++++++----
> > >  net/wireless/util.c    |    3 ++-
> > >  3 files changed, 50 insertions(+), 5 deletions(-)
> > > 
> > > diff --git a/include/net/cfg80211.h b/include/net/cfg80211.h
> > > index f8cd4cf..7d5b600 100644
> > > --- a/include/net/cfg80211.h
> > > +++ b/include/net/cfg80211.h
> > > @@ -2652,6 +2652,15 @@ unsigned int ieee80211_get_hdrlen_from_skb(const struct sk_buff *skb);
> > >  unsigned int __attribute_const__ ieee80211_hdrlen(__le16 fc);
> > >  
> > >  /**
> > > + * ieee80211_get_mesh_hdrlen - get mesh extension header length
> > > + * @meshhdr: the mesh extension header, only the flags field
> > > + *	(first byte) will be accessed
> > > + * Returns the length of the extension header, which is always at
> > > + * least 6 bytes and at most 18 if address 5 and 6 are present.
> > > + */
> > > +unsigned int ieee80211_get_mesh_hdrlen(struct ieee80211s_hdr *meshhdr);
> > > +
> > > +/**
> > >   * DOC: Data path helpers
> > >   *
> > >   * In addition to generic utilities, cfg80211 also offers
> > > diff --git a/net/mac80211/rx.c b/net/mac80211/rx.c
> > > index 99cdee1..6d1fd39 100644
> > > --- a/net/mac80211/rx.c
> > > +++ b/net/mac80211/rx.c
> > > @@ -531,6 +531,11 @@ ieee80211_rx_mesh_check(struct ieee80211_rx_data *rx)
> > >  
> > >  		if (ieee80211_is_action(hdr->frame_control)) {
> > >  			u8 category;
> > > +
> > > +			/* make sure category field is present */
> > > +			if (rx->skb->len < IEEE80211_MIN_ACTION_SIZE)
> > > +				return RX_DROP_MONITOR;
> > > +
> > >  			mgmt = (struct ieee80211_mgmt *)hdr;
> > >  			category = mgmt->u.action.category;
> > >  			if (category != WLAN_CATEGORY_MESH_ACTION &&
> > > @@ -1892,6 +1897,20 @@ ieee80211_rx_h_mesh_fwding(struct ieee80211_rx_data *rx)
> > >  
> > >  	hdr = (struct ieee80211_hdr *) skb->data;
> > >  	hdrlen = ieee80211_hdrlen(hdr->frame_control);
> > > +
> > > +	/* make sure fixed part of mesh header is there, also checks skb len */
> > > +	if (!pskb_may_pull(rx->skb, hdrlen + 6))
> > > +		return RX_DROP_MONITOR;
> > > +
> > > +	mesh_hdr = (struct ieee80211s_hdr *) (skb->data + hdrlen);
> > > +
> > > +	/* make sure full mesh header is there, also checks skb len */
> > > +	if (!pskb_may_pull(rx->skb,
> > > +			   hdrlen + ieee80211_get_mesh_hdrlen(mesh_hdr)))
> > > +		return RX_DROP_MONITOR;
> > > +
> > > +	/* reload pointers */
> > > +	hdr = (struct ieee80211_hdr *) skb->data;
> > >  	mesh_hdr = (struct ieee80211s_hdr *) (skb->data + hdrlen);
> > >  
> > >  	/* frame is in RMC, don't forward */
> > > @@ -1913,11 +1932,19 @@ ieee80211_rx_h_mesh_fwding(struct ieee80211_rx_data *rx)
> > >  		char *mpp_addr;
> > >  
> > >  		if (is_multicast_ether_addr(hdr->addr1)) {
> > > -			mpp_addr = hdr->addr3;
> > > -			proxied_addr = mesh_hdr->eaddr1;
> > > +			if (mesh_hdr->flags & MESH_FLAGS_AE_A4) {
> > > +				mpp_addr = hdr->addr3;
> > > +				proxied_addr = mesh_hdr->eaddr1;
> > > +			} else {
> > > +				return RX_DROP_MONITOR;
> > > +			}
> > >  		} else {
> > > -			mpp_addr = hdr->addr4;
> > > -			proxied_addr = mesh_hdr->eaddr2;
> > > +			if (mesh_hdr->flags & MESH_FLAGS_AE_A5_A6) {
> > > +				mpp_addr = hdr->addr4;
> > > +				proxied_addr = mesh_hdr->eaddr2;
> > > +			} else {
> > > +				return RX_DROP_MONITOR;
> > > +			}
> > 
> > This will drop all non-proxied mcast or unicast data frames :)
> > 
> > It looks like this was already incorrect, but what if you only read the
> > eaddrs if the right flag is set? Like:
> > 
> >  		if (is_multicast_ether_addr(hdr->addr1) &&
> > 		    mesh_hdr->flags & MESH_FLAGS_AE_A4) {
> > 			mpp_addr = hdr->addr3;
> > 			proxied_addr = mesh_hdr->eaddr1;
> >  		} else if (mesh_hdr->flags & MESH_FLAGS_AE_A5_A6) {
> > 			mpp_addr = hdr->addr4;
> > 			proxied_addr = mesh_hdr->eaddr2;
> > 		}
> 
> Or even just:
> 
>   		if (mesh_hdr->flags & MESH_FLAGS_AE_A4) {
>  			mpp_addr = hdr->addr3;
>  			proxied_addr = mesh_hdr->eaddr1;
>   		} else if (mesh_hdr->flags & MESH_FLAGS_AE_A5_A6) {
>  			mpp_addr = hdr->addr4;
>  			proxied_addr = mesh_hdr->eaddr2;
>  		}
> 
> Should be sufficient since according to table 8-14, those bits are only
> used for proxied mcast and unicast data frames, respectively.

Oh, that hunk is already inside the MESH_FLAGS_AE check... so:


   		if (mesh_hdr->flags & MESH_FLAGS_AE_A4) {
  			mpp_addr = hdr->addr3;
  			proxied_addr = mesh_hdr->eaddr1;
   		} else if (mesh_hdr->flags & MESH_FLAGS_AE_A5_A6) {
  			mpp_addr = hdr->addr4;
  			proxied_addr = mesh_hdr->eaddr2;
  		} else
			return RX_DROP_MONITOR;

Should be ok since we already made sure to have enough data for each
address extension size.

Sorry for the noise,
Thomas

  reply	other threads:[~2012-10-26  0:57 UTC|newest]

Thread overview: 13+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2012-10-25 22:46 [PATCH 0/3] mac80211: audit for access to skb data Johannes Berg
2012-10-25 22:46 ` [PATCH 1/3] mac80211: check management frame header length Johannes Berg
2012-10-25 22:46 ` [PATCH 2/3] mac80211: verify that skb data is present Johannes Berg
2012-10-25 23:05   ` Thomas Pedersen
2012-10-25 23:58     ` Thomas Pedersen
2012-10-26  0:57       ` Thomas Pedersen [this message]
2012-10-26 10:19         ` Johannes Berg
2012-10-26 10:21           ` Johannes Berg
2012-10-26 11:00   ` [PATCH v2 " Johannes Berg
2012-10-26 16:29     ` Thomas Pedersen
2012-10-26 16:35       ` Johannes Berg
2012-10-25 22:46 ` [PATCH 3/3] mac80211: make sure data is accessible in EAPOL check Johannes Berg
2012-10-29  9:09 ` [PATCH 0/3] mac80211: audit for access to skb data Johannes Berg

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20121026005748.GA30982@shredder \
    --to=thomas@cozybit.com \
    --cc=johannes.berg@intel.com \
    --cc=johannes@sipsolutions.net \
    --cc=linux-wireless@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).