diff options
author | Mateusz Jurczyk <mjurczyk@google.com> | 2017-06-13 14:06:12 -0400 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2017-06-13 16:16:11 -0400 |
commit | 20a3d5bf5e5b13c02450ab6178ec374abd830686 (patch) | |
tree | 11d51c4ad2457225fef5b52a30b0a8567c3ff379 | |
parent | 7de84403a2020874714f6f40170f5ef9fc7ab58e (diff) |
caif: Add sockaddr length check before accessing sa_family in connect handler
Verify that the caller-provided sockaddr structure is large enough to
contain the sa_family field, before accessing it in the connect()
handler of the AF_CAIF socket. Since the syscall doesn't enforce a minimum
size of the corresponding memory region, very short sockaddrs (zero or one
byte long) result in operating on uninitialized memory while referencing
sa_family.
Signed-off-by: Mateusz Jurczyk <mjurczyk@google.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
-rw-r--r-- | net/caif/caif_socket.c | 4 |
1 files changed, 4 insertions, 0 deletions
diff --git a/net/caif/caif_socket.c b/net/caif/caif_socket.c index adcad344c843..21f18ea2fce4 100644 --- a/net/caif/caif_socket.c +++ b/net/caif/caif_socket.c | |||
@@ -754,6 +754,10 @@ static int caif_connect(struct socket *sock, struct sockaddr *uaddr, | |||
754 | 754 | ||
755 | lock_sock(sk); | 755 | lock_sock(sk); |
756 | 756 | ||
757 | err = -EINVAL; | ||
758 | if (addr_len < offsetofend(struct sockaddr, sa_family)) | ||
759 | goto out; | ||
760 | |||
757 | err = -EAFNOSUPPORT; | 761 | err = -EAFNOSUPPORT; |
758 | if (uaddr->sa_family != AF_CAIF) | 762 | if (uaddr->sa_family != AF_CAIF) |
759 | goto out; | 763 | goto out; |