ca8210: fix mac_len negative array access

[ Upstream commit 6c993779ea1d0cccdb3a5d7d45446dd229e610a3 ]

This patch fixes a buffer overflow access of skb->data if
ieee802154_hdr_peek_addrs() fails.

Reported-by: lianhui tang <bluetlh@gmail.com>
Signed-off-by: Alexander Aring <aahringo@redhat.com>
Link: https://lore.kernel.org/r/20230217042504.3303396-1-aahringo@redhat.com
Signed-off-by: Stefan Schmidt <stefan@datenfreihafen.org>
Signed-off-by: Sasha Levin <sashal@kernel.org>
This commit is contained in:
Alexander Aring 2023-02-16 23:25:04 -05:00 committed by Greg Kroah-Hartman
parent 9e7723b684
commit d2b3bd0d4c

View File

@ -1955,6 +1955,8 @@ static int ca8210_skb_tx(
* packet * packet
*/ */
mac_len = ieee802154_hdr_peek_addrs(skb, &header); mac_len = ieee802154_hdr_peek_addrs(skb, &header);
if (mac_len < 0)
return mac_len;
secspec.security_level = header.sec.level; secspec.security_level = header.sec.level;
secspec.key_id_mode = header.sec.key_id_mode; secspec.key_id_mode = header.sec.key_id_mode;