diff options
author | Matthew Leach <matthew.leach@arm.com> | 2014-03-11 11:58:27 +0000 |
---|---|---|
committer | Jiri Slaby <jslaby@suse.cz> | 2014-04-18 11:07:03 +0200 |
commit | 21ddf0c09da76adf3d4a66473cf01bc1b428453d (patch) | |
tree | 84d73a3d85788d2aaa141f51f8982fb279dbcbd0 /net | |
parent | 9ee68ddbab843386afdcc369acf8a96c28b6cdf2 (diff) |
net: socket: error on a negative msg_namelen
[ Upstream commit dbb490b96584d4e958533fb637f08b557f505657 ]
When copying in a struct msghdr from the user, if the user has set the
msg_namelen parameter to a negative value it gets clamped to a valid
size due to a comparison between signed and unsigned values.
Ensure the syscall errors when the user passes in a negative value.
Signed-off-by: Matthew Leach <matthew.leach@arm.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Signed-off-by: Jiri Slaby <jslaby@suse.cz>
Diffstat (limited to 'net')
-rw-r--r-- | net/socket.c | 4 |
1 files changed, 4 insertions, 0 deletions
diff --git a/net/socket.c b/net/socket.c index e83c416708a..dc57dae20a9 100644 --- a/net/socket.c +++ b/net/socket.c @@ -1972,6 +1972,10 @@ static int copy_msghdr_from_user(struct msghdr *kmsg, { if (copy_from_user(kmsg, umsg, sizeof(struct msghdr))) return -EFAULT; + + if (kmsg->msg_namelen < 0) + return -EINVAL; + if (kmsg->msg_namelen > sizeof(struct sockaddr_storage)) kmsg->msg_namelen = sizeof(struct sockaddr_storage); return 0; |