aboutsummaryrefslogtreecommitdiffstats
path: root/security/selinux/hooks.c
diff options
context:
space:
mode:
authorKees Cook <[email protected]>2025-05-09 18:46:45 +0000
committerJohannes Berg <[email protected]>2025-05-15 11:20:33 +0000
commit82bbe02b2500ef0a62053fe2eb84773fe31c5a0a (patch)
tree5cdd43e91885a7e2adfc5dea7250530fc095d60d /security/selinux/hooks.c
parentMerge tag 'net-6.15-rc6' of git://git.kernel.org/pub/scm/linux/kernel/git/net... (diff)
downloadkernel-82bbe02b2500ef0a62053fe2eb84773fe31c5a0a.tar.gz
kernel-82bbe02b2500ef0a62053fe2eb84773fe31c5a0a.zip
wifi: mac80211: Set n_channels after allocating struct cfg80211_scan_request
Make sure that n_channels is set after allocating the struct cfg80211_registered_device::int_scan_req member. Seen with syzkaller: UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:1208:5 index 0 is out of range for type 'struct ieee80211_channel *[] __counted_by(n_channels)' (aka 'struct ieee80211_channel *[]') This was missed in the initial conversions because I failed to locate the allocation likely due to the "sizeof(void *)" not matching the "channels" array type. Reported-by: [email protected] Closes: https://lore.kernel.org/lkml/[email protected]/ Fixes: e3eac9f32ec0 ("wifi: cfg80211: Annotate struct cfg80211_scan_request with __counted_by") Signed-off-by: Kees Cook <[email protected]> Reviewed-by: Gustavo A. R. Silva <[email protected]> Link: https://patch.msgid.link/[email protected] Signed-off-by: Johannes Berg <[email protected]>
Diffstat (limited to 'security/selinux/hooks.c')
0 files changed, 0 insertions, 0 deletions