linux_dsm_epyc7002/include/net/sctp
Marcelo Ricardo Leitner d4dbef7046 sctp: validate from_addr_param return
[ Upstream commit 0c5dc070ff3d6246d22ddd931f23a6266249e3db ]

Ilja reported that, simply putting it, nothing was validating that
from_addr_param functions were operating on initialized memory. That is,
the parameter itself was being validated by sctp_walk_params, but it
doesn't check for types and their specific sizes and it could be a 0-length
one, causing from_addr_param to potentially work over the next parameter or
even uninitialized memory.

The fix here is to, in all calls to from_addr_param, check if enough space
is there for the wanted IP address type.

Reported-by: Ilja Van Sprundel <ivansprundel@ioactive.com>
Signed-off-by: Marcelo Ricardo Leitner <marcelo.leitner@gmail.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Signed-off-by: Sasha Levin <sashal@kernel.org>
2021-07-19 09:44:55 +02:00
..
auth.h
checksum.h
command.h
constants.h sctp: Don't advertise IPv4 addresses if ipv6only is set on the socket 2020-06-25 16:11:33 -07:00
sctp.h net: sctp: drop duplicate words in comments 2020-07-15 20:34:11 -07:00
sm.h
stream_interleave.h
stream_sched.h
structs.h sctp: validate from_addr_param return 2021-07-19 09:44:55 +02:00
tsnmap.h
ulpevent.h
ulpqueue.h