sock_diag: Fix out-of-bounds access to sock_diag_handlers[]
authorMathias Krause <minipli@googlemail.com>
Sat, 23 Feb 2013 01:13:47 +0000 (01:13 +0000)
committerDavid S. Miller <davem@davemloft.net>
Sat, 23 Feb 2013 18:51:54 +0000 (13:51 -0500)
Userland can send a netlink message requesting SOCK_DIAG_BY_FAMILY
with a family greater or equal then AF_MAX -- the array size of
sock_diag_handlers[]. The current code does not test for this
condition therefore is vulnerable to an out-of-bound access opening
doors for a privilege escalation.

Signed-off-by: Mathias Krause <minipli@googlemail.com>
Acked-by: Eric Dumazet <edumazet@google.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
net/core/sock_diag.c

index 602cd637182ebb321af6773d2ccfe9a8945d44c5..750f44f3aa3117b578af1377ff07abb79032a612 100644 (file)
@@ -121,6 +121,9 @@ static int __sock_diag_rcv_msg(struct sk_buff *skb, struct nlmsghdr *nlh)
        if (nlmsg_len(nlh) < sizeof(*req))
                return -EINVAL;
 
+       if (req->sdiag_family >= AF_MAX)
+               return -EINVAL;
+
        hndl = sock_diag_lock_handler(req->sdiag_family);
        if (hndl == NULL)
                err = -ENOENT;