sctp: prevent reading out-of-bounds memory
authorDan Rosenberg <dan.j.rosenberg@gmail.com>
Fri, 1 Oct 2010 11:16:58 +0000 (11:16 +0000)
committerDavid S. Miller <davem@davemloft.net>
Mon, 4 Oct 2010 04:58:48 +0000 (21:58 -0700)
commitd7e0d19aa0fdd22819d35db551bd54c1bcf9c2aa
tree3abc10f8a6e3f296fb619077af5f6f16713c62b8
parent5b7c84066733c5dfb0e4016d939757b38de189e4
sctp: prevent reading out-of-bounds memory

Two user-controlled allocations in SCTP are subsequently dereferenced as
sockaddr structs, without checking if the dereferenced struct members fall
beyond the end of the allocated chunk.  There doesn't appear to be any
information leakage here based on how these members are used and
additional checking, but it's still worth fixing.

[akpm@linux-foundation.org: remove unfashionable newlines, fix gmail tab->space conversion]
Signed-off-by: Dan Rosenberg <dan.j.rosenberg@gmail.com>
Acked-by: Vlad Yasevich <vladislav.yasevich@hp.com>
Cc: David Miller <davem@davemloft.net>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
net/sctp/socket.c