From 3ce072db5b417dc9008c49e6cc5c5bd4bc08e05d Mon Sep 17 00:00:00 2001 From: Tetsuo Handa Date: Thu, 16 May 2019 18:15:15 +0000 Subject: [PATCH] sctp: Check address length before reading address family mainline inclusion from mainline-5.1-rc6 commit 175f7c1f01d3 category: bugfix bugzilla: 14097 CVE: NA ------------------------------------------------- KMSAN will complain if valid address length passed to connect() is shorter than sizeof("struct sockaddr"->sa_family) bytes. Signed-off-by: Tetsuo Handa Acked-by: Neil Horman Signed-off-by: David S. Miller Signed-off-by: Zhiqiang Liu Reviewed-by: Wenan Mao Signed-off-by: Yang Yingliang --- net/sctp/socket.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/net/sctp/socket.c b/net/sctp/socket.c index 78e88ddb1e4b..159696e02591 100644 --- a/net/sctp/socket.c +++ b/net/sctp/socket.c @@ -4529,7 +4529,8 @@ static int sctp_connect(struct sock *sk, struct sockaddr *addr, } /* Validate addr_len before calling common connect/connectx routine. */ - af = sctp_get_af_specific(addr->sa_family); + af = addr_len < offsetofend(struct sockaddr, sa_family) ? NULL : + sctp_get_af_specific(addr->sa_family); if (!af || addr_len < af->sockaddr_len) { err = -EINVAL; } else { -- GitLab