diff options
author | Sasha Levin <sasha.levin@oracle.com> | 2015-03-23 15:30:00 -0400 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2015-03-24 12:50:39 -0400 |
commit | 610600c8c5e25d551a010b64412cf731c084b1e1 (patch) | |
tree | aa1e059d0a28f346d32e764c7720ff8126fc8f49 | |
parent | 0117ec1970c5fa9c566045e7df8db76acc8f150e (diff) |
tipc: validate length of sockaddr in connect() for dgram/rdm
Commit f2f8036 ("tipc: add support for connect() on dgram/rdm sockets")
hasn't validated user input length for the sockaddr structure which allows
a user to overwrite kernel memory with arbitrary input.
Fixes: f2f8036 ("tipc: add support for connect() on dgram/rdm sockets")
Signed-off-by: Sasha Levin <sasha.levin@oracle.com>
Acked-by: Ying Xue <ying.xue@windriver.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
-rw-r--r-- | net/tipc/socket.c | 2 |
1 files changed, 2 insertions, 0 deletions
diff --git a/net/tipc/socket.c b/net/tipc/socket.c index 6dd5bd95236a..094710519477 100644 --- a/net/tipc/socket.c +++ b/net/tipc/socket.c | |||
@@ -1851,6 +1851,8 @@ static int tipc_connect(struct socket *sock, struct sockaddr *dest, | |||
1851 | if (dst->family == AF_UNSPEC) { | 1851 | if (dst->family == AF_UNSPEC) { |
1852 | memset(&tsk->remote, 0, sizeof(struct sockaddr_tipc)); | 1852 | memset(&tsk->remote, 0, sizeof(struct sockaddr_tipc)); |
1853 | tsk->connected = 0; | 1853 | tsk->connected = 0; |
1854 | } else if (destlen != sizeof(struct sockaddr_tipc)) { | ||
1855 | res = -EINVAL; | ||
1854 | } else { | 1856 | } else { |
1855 | memcpy(&tsk->remote, dest, destlen); | 1857 | memcpy(&tsk->remote, dest, destlen); |
1856 | tsk->connected = 1; | 1858 | tsk->connected = 1; |