[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1488828542.9415.391.camel@edumazet-glaptop3.roam.corp.google.com>
Date: Mon, 06 Mar 2017 11:29:02 -0800
From: Eric Dumazet <eric.dumazet@...il.com>
To: Alexander Potapenko <glider@...gle.com>
Cc: dvyukov@...gle.com, kcc@...gle.com, keescook@...omium.org,
edumazet@...gle.com, paul@...l-moore.com, sds@...ho.nsa.gov,
linux-kernel@...r.kernel.org, netdev@...r.kernel.org,
selinux@...ho.nsa.gov
Subject: Re: [PATCH v2] selinux: check for address length in
selinux_socket_bind()
On Mon, 2017-03-06 at 19:46 +0100, Alexander Potapenko wrote:
> KMSAN (KernelMemorySanitizer, a new error detection tool) reports use of
> uninitialized memory in selinux_socket_bind():
>
...
> Signed-off-by: Alexander Potapenko <glider@...gle.com>
> ---
> Changes since v1:
> - fixed patch description
> - fixed addrlen tests to match those in inet_bind() and inet6_bind()
> (per comment from Eric Dumazet)
> ---
> security/selinux/hooks.c | 9 +++++++++
> 1 file changed, 9 insertions(+)
>
> diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c
> index 0a4b4b040e0a..ddc4aca6c840 100644
> --- a/security/selinux/hooks.c
> +++ b/security/selinux/hooks.c
> @@ -4351,10 +4351,19 @@ static int selinux_socket_bind(struct socket *sock, struct sockaddr *address, in
> u32 sid, node_perm;
>
> if (family == PF_INET) {
> + if (addrlen < sizeof(struct sockaddr_in)) {
> + err = -EINVAL;
> + goto out;
> + }
> addr4 = (struct sockaddr_in *)address;
> snum = ntohs(addr4->sin_port);
> addrp = (char *)&addr4->sin_addr.s_addr;
> +
> } else {
> + if (addrlen < SIN6_LEN_RFC2133) {
> + err = -EINVAL;
> + goto out;
> + }
> addr6 = (struct sockaddr_in6 *)address;
> snum = ntohs(addr6->sin6_port);
> addrp = (char *)&addr6->sin6_addr.s6_addr;
Acked-by: Eric Dumazet <edumazet@...gle.com>
Powered by blists - more mailing lists