diff options
| author | Kees Cook <[email protected]> | 2025-05-09 18:46:45 +0000 |
|---|---|---|
| committer | Johannes Berg <[email protected]> | 2025-05-15 11:20:33 +0000 |
| commit | 82bbe02b2500ef0a62053fe2eb84773fe31c5a0a (patch) | |
| tree | 5cdd43e91885a7e2adfc5dea7250530fc095d60d /security/selinux/hooks.c | |
| parent | Merge tag 'net-6.15-rc6' of git://git.kernel.org/pub/scm/linux/kernel/git/net... (diff) | |
| download | kernel-82bbe02b2500ef0a62053fe2eb84773fe31c5a0a.tar.gz kernel-82bbe02b2500ef0a62053fe2eb84773fe31c5a0a.zip | |
wifi: mac80211: Set n_channels after allocating struct cfg80211_scan_request
Make sure that n_channels is set after allocating the
struct cfg80211_registered_device::int_scan_req member. Seen with
syzkaller:
UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:1208:5
index 0 is out of range for type 'struct ieee80211_channel *[] __counted_by(n_channels)' (aka 'struct ieee80211_channel *[]')
This was missed in the initial conversions because I failed to locate
the allocation likely due to the "sizeof(void *)" not matching the
"channels" array type.
Reported-by: [email protected]
Closes: https://lore.kernel.org/lkml/[email protected]/
Fixes: e3eac9f32ec0 ("wifi: cfg80211: Annotate struct cfg80211_scan_request with __counted_by")
Signed-off-by: Kees Cook <[email protected]>
Reviewed-by: Gustavo A. R. Silva <[email protected]>
Link: https://patch.msgid.link/[email protected]
Signed-off-by: Johannes Berg <[email protected]>
Diffstat (limited to 'security/selinux/hooks.c')
0 files changed, 0 insertions, 0 deletions
