diff options
author | Liu Jian <liujian56@huawei.com> | 2022-04-16 18:57:59 +0800 |
---|---|---|
committer | Greg Kroah-Hartman <gregkh@linuxfoundation.org> | 2022-06-06 08:24:22 +0200 |
commit | 22771d3095deeca0d2aefd55999fa8a50caea3cd (patch) | |
tree | 622bd92aafefe10ce375a8cce816ff73946618fb /security/lsm_audit.c | |
parent | ef481b262bba4f454351eec43f024fec942c2d4c (diff) | |
download | linux-stable-22771d3095deeca0d2aefd55999fa8a50caea3cd.tar.gz linux-stable-22771d3095deeca0d2aefd55999fa8a50caea3cd.tar.bz2 linux-stable-22771d3095deeca0d2aefd55999fa8a50caea3cd.zip |
bpf: Enlarge offset check value to INT_MAX in bpf_skb_{load,store}_bytes
commit 45969b4152c1752089351cd6836a42a566d49bcf upstream.
The data length of skb frags + frag_list may be greater than 0xffff, and
skb_header_pointer can not handle negative offset. So, here INT_MAX is used
to check the validity of offset. Add the same change to the related function
skb_store_bytes.
Fixes: 05c74e5e53f6 ("bpf: add bpf_skb_load_bytes helper")
Signed-off-by: Liu Jian <liujian56@huawei.com>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Acked-by: Song Liu <songliubraving@fb.com>
Link: https://lore.kernel.org/bpf/20220416105801.88708-2-liujian56@huawei.com
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'security/lsm_audit.c')
0 files changed, 0 insertions, 0 deletions