diff options
author | Gavrilov Ilia <Ilia.Gavrilov@infotecs.ru> | 2024-03-07 14:23:50 +0000 |
---|---|---|
committer | Sasha Levin <sashal@kernel.org> | 2024-03-26 18:22:37 -0400 |
commit | 7089428a1a4e28efa0c36877d80639a8306fdbf4 (patch) | |
tree | dbccca60b8ee060112b2e7a6e7ddfd78b8df1dfd | |
parent | 867608c0abcbdc86e62925604ac2d3f0c7ca678a (diff) | |
download | linux-stable-7089428a1a4e28efa0c36877d80639a8306fdbf4.tar.gz linux-stable-7089428a1a4e28efa0c36877d80639a8306fdbf4.tar.bz2 linux-stable-7089428a1a4e28efa0c36877d80639a8306fdbf4.zip |
net/x25: fix incorrect parameter validation in the x25_getsockopt() function
[ Upstream commit d6eb8de2015f0c24822e47356f839167ebde2945 ]
The 'len' variable can't be negative when assigned the result of
'min_t' because all 'min_t' parameters are cast to unsigned int,
and then the minimum one is chosen.
To fix the logic, check 'len' as read from 'optlen',
where the types of relevant variables are (signed) int.
Fixes: 1da177e4c3f4 ("Linux-2.6.12-rc2")
Signed-off-by: Gavrilov Ilia <Ilia.Gavrilov@infotecs.ru>
Signed-off-by: David S. Miller <davem@davemloft.net>
Signed-off-by: Sasha Levin <sashal@kernel.org>
-rw-r--r-- | net/x25/af_x25.c | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/net/x25/af_x25.c b/net/x25/af_x25.c index 9d0328bb30ca..8d78f204ba3c 100644 --- a/net/x25/af_x25.c +++ b/net/x25/af_x25.c @@ -475,12 +475,12 @@ static int x25_getsockopt(struct socket *sock, int level, int optname, if (get_user(len, optlen)) goto out; - len = min_t(unsigned int, len, sizeof(int)); - rc = -EINVAL; if (len < 0) goto out; + len = min_t(unsigned int, len, sizeof(int)); + rc = -EFAULT; if (put_user(len, optlen)) goto out; |