Skip to content

Commit

Permalink
x25: Validate incoming call user data lengths
Browse files Browse the repository at this point in the history
X.25 call user data is being copied in its entirety from incoming messages
without consideration to the size of the destination buffers, leading to
possible buffer overflows. Validate incoming call user data lengths before
these copies are performed.

It appears this issue was noticed some time ago, however nothing seemed to
come of it: see http://www.spinics.net/lists/linux-x25/msg00043.html and
commit 8db09f2.

Signed-off-by: Matthew Daley <[email protected]>
Acked-by: Eric Dumazet <[email protected]>
Tested-by: Andrew Hendry <[email protected]>
Cc: stable <[email protected]>
Signed-off-by: David S. Miller <[email protected]>
  • Loading branch information
Matthew Daley authored and davem330 committed Oct 17, 2011
1 parent f36c23b commit c7fd0d4
Show file tree
Hide file tree
Showing 2 changed files with 9 additions and 0 deletions.
6 changes: 6 additions & 0 deletions net/x25/af_x25.c
Original file line number Diff line number Diff line change
Expand Up @@ -958,6 +958,12 @@ int x25_rx_call_request(struct sk_buff *skb, struct x25_neigh *nb,
goto out_clear_request;
skb_pull(skb,len);

/*
* Ensure that the amount of call user data is valid.
*/
if (skb->len > X25_MAX_CUD_LEN)
goto out_clear_request;

/*
* Find a listener for the particular address/cud pair.
*/
Expand Down
3 changes: 3 additions & 0 deletions net/x25/x25_in.c
Original file line number Diff line number Diff line change
Expand Up @@ -127,6 +127,9 @@ static int x25_state1_machine(struct sock *sk, struct sk_buff *skb, int frametyp
* Copy any Call User Data.
*/
if (skb->len > 0) {
if (skb->len > X25_MAX_CUD_LEN)
goto out_clear;

skb_copy_from_linear_data(skb,
x25->calluserdata.cuddata,
skb->len);
Expand Down

0 comments on commit c7fd0d4

Please sign in to comment.