Received: by 2002:ac0:98c7:0:0:0:0:0 with SMTP id g7-v6csp2461114imd; Fri, 2 Nov 2018 11:48:32 -0700 (PDT) X-Google-Smtp-Source: AJdET5d0fKIMY0mUM+PAYf97oUVDCn0oMwUqSWGfVGyfo4ORapYozYI+gsrBvLeMSbukU/NLywHT X-Received: by 2002:a65:65c9:: with SMTP id y9mr12227147pgv.438.1541184512205; Fri, 02 Nov 2018 11:48:32 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1541184512; cv=none; d=google.com; s=arc-20160816; b=EDdy5gkGkc952QtBrCOKpTg+kcuDkZgtYXJVDycAMNF3jO248jds/K29iMDgiyp2Sq sGG4RCKHGoyEMoROKA4EGLCbm8FV6YjRxVXNx45vW+B+8ifkm6D73onfczdQ6CLmovgo FmXEFXN12dAjFdUh0iyVVLYvBbhyn8om/QJNwuwfXmBSPGnVmifxGbS/F7gAnrAhdKr3 dIivibsrd0Bn//Y2yYcx0Tv/nZegXiq2OACbrn6rCJZ/WtNhrDWZuuj1OMOFME8KCoDA GwBDRdcN8PncZxndx0Essb0A2kHMXeFsAy/dobEDUh71Hy6FmJ1UKY3gPeQ3kQFPU9Mj E4iA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=OkqhTnHQUEfGGXRa80PCZBSTX+efSYKl5FYmbtlPUb0=; b=BiK0fB6/lbaUCUmfa7KUcy2+KuEUqffIbjbBe4tSS92AGjHbcnleTEoSWV7DP+xlp/ u9nsHY/Eq7rIXeED0AseWt7boprqU4jp8TFArv5YYCn9xnHUW+FfeQeRcSjT8rSA1dMD rjG+gDMFBXw7tukwnkEihSkkaasiqbvyqL1Di8Hrre3kNE0dQkimmXvOFsMvH4sShd0L o1Gg0ettakSyZZuvstgfDw6fa99aLzE2+1EQ0cAMcr+vaslaW9NyEaAGQCveaXTnPYUo +gZ1qy7DFD5waKq9DfZdAygrnPDi5JKppsIVKop4a9f1PzUNOP1LnBwkuCNAq7jjRD/N 0+HQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=YOUTjpBZ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f3-v6si25076706pld.186.2018.11.02.11.48.17; Fri, 02 Nov 2018 11:48:32 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=YOUTjpBZ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729945AbeKCDzk (ORCPT + 99 others); Fri, 2 Nov 2018 23:55:40 -0400 Received: from mail.kernel.org ([198.145.29.99]:51238 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727629AbeKCDzj (ORCPT ); Fri, 2 Nov 2018 23:55:39 -0400 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 8C4E32082D; Fri, 2 Nov 2018 18:47:25 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1541184446; bh=G5NVv09QHA1GYTApVmQQUHxaPoyjNEZrr0c6QJN5xlY=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=YOUTjpBZI3EhDsiBIuFtAMbLJyOz/8askOmKMmn1cI5MmjCaCus/o3wuFfyydyeRB IOfLMqQnM/gWVvi0ItnfWAzOaCOqewFGEuJ0KAmRWbuSx4HXpBv9xq7l91+G8UHBAK JaYY37MWUjBWIZISha9n1y8GbpLT4doTCdA8Kp2E= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Air Icy , Steffen Klassert , Sasha Levin Subject: [PATCH 4.14 001/143] xfrm: Validate address prefix lengths in the xfrm selector. Date: Fri, 2 Nov 2018 19:33:06 +0100 Message-Id: <20181102182857.177558003@linuxfoundation.org> X-Mailer: git-send-email 2.19.1 In-Reply-To: <20181102182857.064326086@linuxfoundation.org> References: <20181102182857.064326086@linuxfoundation.org> User-Agent: quilt/0.65 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ [ Upstream commit 07bf7908950a8b14e81aa1807e3c667eab39287a ] We don't validate the address prefix lengths in the xfrm selector we got from userspace. This can lead to undefined behaviour in the address matching functions if the prefix is too big for the given address family. Fix this by checking the prefixes and refuse SA/policy insertation when a prefix is invalid. Fixes: 1da177e4c3f4 ("Linux-2.6.12-rc2") Reported-by: Air Icy Signed-off-by: Steffen Klassert Signed-off-by: Sasha Levin --- net/xfrm/xfrm_user.c | 12 ++++++++++++ 1 file changed, 12 insertions(+) diff --git a/net/xfrm/xfrm_user.c b/net/xfrm/xfrm_user.c index 5554d28a32eb..4292347bf45e 100644 --- a/net/xfrm/xfrm_user.c +++ b/net/xfrm/xfrm_user.c @@ -151,10 +151,16 @@ static int verify_newsa_info(struct xfrm_usersa_info *p, err = -EINVAL; switch (p->family) { case AF_INET: + if (p->sel.prefixlen_d > 32 || p->sel.prefixlen_s > 32) + goto out; + break; case AF_INET6: #if IS_ENABLED(CONFIG_IPV6) + if (p->sel.prefixlen_d > 128 || p->sel.prefixlen_s > 128) + goto out; + break; #else err = -EAFNOSUPPORT; @@ -1353,10 +1359,16 @@ static int verify_newpolicy_info(struct xfrm_userpolicy_info *p) switch (p->sel.family) { case AF_INET: + if (p->sel.prefixlen_d > 32 || p->sel.prefixlen_s > 32) + return -EINVAL; + break; case AF_INET6: #if IS_ENABLED(CONFIG_IPV6) + if (p->sel.prefixlen_d > 128 || p->sel.prefixlen_s > 128) + return -EINVAL; + break; #else return -EAFNOSUPPORT; -- 2.17.1