From: Dan Carpenter Date: Thu, 23 Jul 2020 15:23:05 +0000 (+0300) Subject: Smack: prevent underflow in smk_set_cipso() X-Git-Tag: v4.9.233~75 X-Git-Url: http://review.tizen.org/git/?a=commitdiff_plain;h=043392644c9149feb835564283d44e8664112837;p=platform%2Fkernel%2Flinux-amlogic.git Smack: prevent underflow in smk_set_cipso() [ Upstream commit 42a2df3e829f3c5562090391b33714b2e2e5ad4a ] We have an upper bound on "maplevel" but forgot to check for negative values. Fixes: e114e473771c ("Smack: Simplified Mandatory Access Control Kernel") Signed-off-by: Dan Carpenter Signed-off-by: Casey Schaufler Signed-off-by: Sasha Levin --- diff --git a/security/smack/smackfs.c b/security/smack/smackfs.c index 2eba7c1e6663..4aecdc8f74b2 100644 --- a/security/smack/smackfs.c +++ b/security/smack/smackfs.c @@ -907,7 +907,7 @@ static ssize_t smk_set_cipso(struct file *file, const char __user *buf, } ret = sscanf(rule, "%d", &maplevel); - if (ret != 1 || maplevel > SMACK_CIPSO_MAXLEVEL) + if (ret != 1 || maplevel < 0 || maplevel > SMACK_CIPSO_MAXLEVEL) goto out; rule += SMK_DIGITLEN;