From patchwork Fri Feb 18 17:50:22 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bartlomiej Zolnierkiewicz X-Patchwork-Id: 1594844 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: bilbo.ozlabs.org; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=canonical.com header.i=@canonical.com header.a=rsa-sha256 header.s=20210705 header.b=DwkiCG4C; dkim-atps=neutral Authentication-Results: ozlabs.org; spf=none (no SPF record) smtp.mailfrom=lists.ubuntu.com (client-ip=91.189.94.19; helo=huckleberry.canonical.com; envelope-from=kernel-team-bounces@lists.ubuntu.com; receiver=) Received: from huckleberry.canonical.com (huckleberry.canonical.com [91.189.94.19]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by bilbo.ozlabs.org (Postfix) with ESMTPS id 4K0fPG6Hz9z9sFN for ; Sat, 19 Feb 2022 04:50:42 +1100 (AEDT) Received: from localhost ([127.0.0.1] helo=huckleberry.canonical.com) by huckleberry.canonical.com with esmtp (Exim 4.86_2) (envelope-from ) id 1nL7Oo-0001Yv-SE; Fri, 18 Feb 2022 17:50:30 +0000 Received: from smtp-relay-internal-1.internal ([10.131.114.114] helo=smtp-relay-internal-1.canonical.com) by huckleberry.canonical.com with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.86_2) (envelope-from ) id 1nL7On-0001Yh-HH for kernel-team@lists.ubuntu.com; Fri, 18 Feb 2022 17:50:29 +0000 Received: from mail-lj1-f200.google.com (mail-lj1-f200.google.com [209.85.208.200]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by smtp-relay-internal-1.canonical.com (Postfix) with ESMTPS id 09DF03F1A4 for ; Fri, 18 Feb 2022 17:50:29 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=canonical.com; s=20210705; t=1645206629; bh=mU06Qa52Sg2FbSiwMT2oUWAJdY6S3/svRCGUiuCNj4E=; h=From:To:Subject:Date:Message-Id:MIME-Version; b=DwkiCG4C6Yh/gVPlYudKwt3Y0XvEN0zjT3DMLOtCmT/gs90XSpJSS0z88M+Sn9xji i0LBt45azGo1sh8hhQ4t4g+IPy/V846c1Dkq/WT9vAG9qz26fnJvdL0TrOscGYZgS5 SBy3PngBfTCuXX1GPDZJ99W1sMQge/AS07yaH84c0FJezjeA3blt8pIdx2JKuUeVDd dGGbxVRP0DUSrBzmsBwwpRaAr8TOy4928i9Th+6q5PT4Kwf/1We+KEQWhxgRYyciw/ qv6/9HMTqdCoQq8M54s750Yaz1fihDUmj+BLb3FxIUz0jBdbUHXa8TRpiNxBVDNsCl N89oqDivf+wTA== Received: by mail-lj1-f200.google.com with SMTP id r9-20020a2eb889000000b002460962b3f2so1651697ljp.9 for ; Fri, 18 Feb 2022 09:50:29 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:subject:date:message-id:mime-version :content-transfer-encoding; bh=mU06Qa52Sg2FbSiwMT2oUWAJdY6S3/svRCGUiuCNj4E=; b=qolqDs/TH6zKnLcC0zNynLl01HXkdarunkZpcBS3Ggf5kEUiI8uD001fMldFoI01hm qaVp3kNcOSxZKAuxFnyNJDH+TVWLLACRA4Z49Kp4HYJAA56yFKeg7jR49WSXyPECXRPV ekrd5MamwfkYxATBT77anU172KhKgcfODDM5R1vBFSUohiTNAlK9YPQiUX2rFDFANYOu jF5yUjo1rLTGLxWUNKc0t73fYi/WQhpef1rQzZ+iF8IKzWtsj+1iX808yJa0PT18cQt3 9EvQctwXgPYq7Ui51l+t1tRpQIc1WRiF7YG5daEw7OMHMEWfUPf02+wzJaAz33armx7P zaEg== X-Gm-Message-State: AOAM530VdfDZQegzzAhMZGTOKWghhKBMd7wDbrhgRudU7d+FlSKYGaHU pSRuvd4QplSmmW/ecfU4AQ8NnFbXBljigcapPpz0IDka5RbN00840OKptHe5xmjI9Hlpn2736IL DgWZn+r1kk3Tt1TlWkU8GKmj+luGZkfxuX8ikfL4Z0w== X-Received: by 2002:a2e:bf12:0:b0:246:b44:1832 with SMTP id c18-20020a2ebf12000000b002460b441832mr6435965ljr.424.1645206628220; Fri, 18 Feb 2022 09:50:28 -0800 (PST) X-Google-Smtp-Source: ABdhPJxzNbSi493E6TGgwieWimVtE+7ek8P/n5qINNfS+0WWjDl0xQjSwUodHd4Q8101Te3zvy0WXw== X-Received: by 2002:a2e:bf12:0:b0:246:b44:1832 with SMTP id c18-20020a2ebf12000000b002460b441832mr6435952ljr.424.1645206627997; Fri, 18 Feb 2022 09:50:27 -0800 (PST) Received: from localhost.localdomain (89-65-217-23.dynamic.chello.pl. [89.65.217.23]) by smtp.gmail.com with ESMTPSA id h6sm392823ljg.58.2022.02.18.09.50.27 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 18 Feb 2022 09:50:27 -0800 (PST) From: Bartlomiej Zolnierkiewicz To: kernel-team@lists.ubuntu.com Subject: [SRU][Bionic][PATCH 0/1] Fix for CVE-2021-43975 Date: Fri, 18 Feb 2022 18:50:22 +0100 Message-Id: <20220218175023.18450-1-bartlomiej.zolnierkiewicz@canonical.com> X-Mailer: git-send-email 2.25.1 MIME-Version: 1.0 X-BeenThere: kernel-team@lists.ubuntu.com X-Mailman-Version: 2.1.20 Precedence: list List-Id: Kernel team discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: kernel-team-bounces@lists.ubuntu.com Sender: "kernel-team" [Impact] In the Linux kernel through 5.15.2, hw_atl_utils_fw_rpc_wait in drivers/net/ethernet/aquantia/atlantic/hw_atl/hw_atl_utils.c allows an attacker (who can introduce a crafted device) to trigger an out-of-bounds write via a crafted length value. [Fix] b922f622592a ("atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait") The fix was cherry picked clean and builds fine. [Potential regression] This change is limited to the aquantia ethernet device driver and is already present in Focal/Impish/Jammy kernels. Zekun Shen (1): atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait .../ethernet/aquantia/atlantic/hw_atl/hw_atl_utils.c | 10 ++++++++++ 1 file changed, 10 insertions(+)