aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorVlad Yasevich <vladislav.yasevich@hp.com>2008-08-27 19:08:54 -0400
committerDavid S. Miller <davem@davemloft.net>2008-08-27 19:08:54 -0400
commit328fc47ea0bcc27d9afa69c3ad6e52431cadd76c (patch)
tree5969688468a63ee01db68be4adff671bd9aa85c8
parentf2455eb176ac87081bbfc9a44b21c7cd2bc1967e (diff)
sctp: correct bounds check in sctp_setsockopt_auth_key
The bonds check to prevent buffer overlflow was not exactly right. It still allowed overflow of up to 8 bytes which is sizeof(struct sctp_authkey). Since optlen is already checked against the size of that struct, we are guaranteed not to cause interger overflow either. Signed-off-by: Vlad Yasevich <vladislav.yasevich@hp.com> Signed-off-by: David S. Miller <davem@davemloft.net>
-rw-r--r--net/sctp/socket.c2
1 files changed, 1 insertions, 1 deletions
diff --git a/net/sctp/socket.c b/net/sctp/socket.c
index afa952e726d7..9b9b2c31dd15 100644
--- a/net/sctp/socket.c
+++ b/net/sctp/socket.c
@@ -3144,7 +3144,7 @@ static int sctp_setsockopt_auth_key(struct sock *sk,
3144 goto out; 3144 goto out;
3145 } 3145 }
3146 3146
3147 if (authkey->sca_keylength > optlen) { 3147 if (authkey->sca_keylength > optlen - sizeof(struct sctp_authkey)) {
3148 ret = -EINVAL; 3148 ret = -EINVAL;
3149 goto out; 3149 goto out;
3150 } 3150 }