Commit ea573723 authored by Eric Dumazet's avatar Eric Dumazet Committed by Greg Kroah-Hartman

inet_diag: fix inet_diag_bc_audit()

[ Upstream commit eeb14972 ]

A malicious user or buggy application can inject code and trigger an
infinite loop in inet_diag_bc_audit()

Also make sure each instruction is aligned on 4 bytes boundary, to avoid
unaligned accesses.
Reported-by: default avatarDan Rosenberg <drosenberg@vsecurity.com>
Signed-off-by: default avatarEric Dumazet <eric.dumazet@gmail.com>
Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
Signed-off-by: default avatarGreg Kroah-Hartman <gregkh@suse.de>
parent d91b1971
...@@ -436,7 +436,7 @@ static int valid_cc(const void *bc, int len, int cc) ...@@ -436,7 +436,7 @@ static int valid_cc(const void *bc, int len, int cc)
return 0; return 0;
if (cc == len) if (cc == len)
return 1; return 1;
if (op->yes < 4) if (op->yes < 4 || op->yes & 3)
return 0; return 0;
len -= op->yes; len -= op->yes;
bc += op->yes; bc += op->yes;
...@@ -446,11 +446,11 @@ static int valid_cc(const void *bc, int len, int cc) ...@@ -446,11 +446,11 @@ static int valid_cc(const void *bc, int len, int cc)
static int inet_diag_bc_audit(const void *bytecode, int bytecode_len) static int inet_diag_bc_audit(const void *bytecode, int bytecode_len)
{ {
const unsigned char *bc = bytecode; const void *bc = bytecode;
int len = bytecode_len; int len = bytecode_len;
while (len > 0) { while (len > 0) {
struct inet_diag_bc_op *op = (struct inet_diag_bc_op *)bc; const struct inet_diag_bc_op *op = bc;
//printk("BC: %d %d %d {%d} / %d\n", op->code, op->yes, op->no, op[1].no, len); //printk("BC: %d %d %d {%d} / %d\n", op->code, op->yes, op->no, op[1].no, len);
switch (op->code) { switch (op->code) {
...@@ -461,22 +461,20 @@ static int inet_diag_bc_audit(const void *bytecode, int bytecode_len) ...@@ -461,22 +461,20 @@ static int inet_diag_bc_audit(const void *bytecode, int bytecode_len)
case INET_DIAG_BC_S_LE: case INET_DIAG_BC_S_LE:
case INET_DIAG_BC_D_GE: case INET_DIAG_BC_D_GE:
case INET_DIAG_BC_D_LE: case INET_DIAG_BC_D_LE:
if (op->yes < 4 || op->yes > len + 4)
return -EINVAL;
case INET_DIAG_BC_JMP: case INET_DIAG_BC_JMP:
if (op->no < 4 || op->no > len + 4) if (op->no < 4 || op->no > len + 4 || op->no & 3)
return -EINVAL; return -EINVAL;
if (op->no < len && if (op->no < len &&
!valid_cc(bytecode, bytecode_len, len - op->no)) !valid_cc(bytecode, bytecode_len, len - op->no))
return -EINVAL; return -EINVAL;
break; break;
case INET_DIAG_BC_NOP: case INET_DIAG_BC_NOP:
if (op->yes < 4 || op->yes > len + 4)
return -EINVAL;
break; break;
default: default:
return -EINVAL; return -EINVAL;
} }
if (op->yes < 4 || op->yes > len + 4 || op->yes & 3)
return -EINVAL;
bc += op->yes; bc += op->yes;
len -= op->yes; len -= op->yes;
} }
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment