summaryrefslogtreecommitdiffstats
path: root/security/selinux/hooks.c
diff options
context:
space:
mode:
authorOndrej Mosnacek <omosnace@redhat.com>2018-11-13 16:16:08 +0100
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>2018-11-21 09:22:10 +0100
commit5fe5a24a8cc8aad54ea6fce78929c61cebfbd707 (patch)
treee075cfc24957541c202d20ac80dc683da1f36521 /security/selinux/hooks.c
parenta80cb9b673349f65b5ce91661982d4a4fccc2e2e (diff)
downloadlinux-stable-5fe5a24a8cc8aad54ea6fce78929c61cebfbd707.tar.gz
linux-stable-5fe5a24a8cc8aad54ea6fce78929c61cebfbd707.tar.bz2
linux-stable-5fe5a24a8cc8aad54ea6fce78929c61cebfbd707.zip
selinux: check length properly in SCTP bind hook
commit c138325fb8713472d5a0c3c7258b9131bab40725 upstream. selinux_sctp_bind_connect() must verify if the address buffer has sufficient length before accessing the 'sa_family' field. See __sctp_connect() for a similar check. The length of the whole address ('len') is already checked in the callees. Reported-by: Qian Cai <cai@gmx.us> Fixes: d452930fd3b9 ("selinux: Add SCTP support") Cc: <stable@vger.kernel.org> # 4.17+ Cc: Richard Haines <richard_c_haines@btinternet.com> Signed-off-by: Ondrej Mosnacek <omosnace@redhat.com> Tested-by: Qian Cai <cai@gmx.us> Signed-off-by: Paul Moore <paul@paul-moore.com> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'security/selinux/hooks.c')
-rw-r--r--security/selinux/hooks.c3
1 files changed, 3 insertions, 0 deletions
diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c
index 4680a217d0fa..46ec7be75d4b 100644
--- a/security/selinux/hooks.c
+++ b/security/selinux/hooks.c
@@ -5306,6 +5306,9 @@ static int selinux_sctp_bind_connect(struct sock *sk, int optname,
addr_buf = address;
while (walk_size < addrlen) {
+ if (walk_size + sizeof(sa_family_t) > addrlen)
+ return -EINVAL;
+
addr = addr_buf;
switch (addr->sa_family) {
case AF_UNSPEC: