On Fri, Dec 29, 2017 at 06:13:05PM -0600, Eric Biggers wrote:
> From: Eric Biggers <ebigg...@google.com>
> 
> If a message sent to a PF_KEY socket ended with one of the extensions
> that takes a 'struct sadb_address' but there were not enough bytes
> remaining in the message for the ->sa_family member of the 'struct
> sockaddr' which is supposed to follow, then verify_address_len() read
> past the end of the message, into uninitialized memory.  Fix it by
> returning -EINVAL in this case.
> 
> This bug was found using syzkaller with KMSAN.
> 
> Reproducer:
> 
>       #include <linux/pfkeyv2.h>
>       #include <sys/socket.h>
>       #include <unistd.h>
> 
>       int main()
>       {
>               int sock = socket(PF_KEY, SOCK_RAW, PF_KEY_V2);
>               char buf[24] = { 0 };
>               struct sadb_msg *msg = (void *)buf;
>               struct sadb_address *addr = (void *)(msg + 1);
> 
>               msg->sadb_msg_version = PF_KEY_V2;
>               msg->sadb_msg_type = SADB_DELETE;
>               msg->sadb_msg_len = 3;
>               addr->sadb_address_len = 1;
>               addr->sadb_address_exttype = SADB_EXT_ADDRESS_SRC;
> 
>               write(sock, buf, 24);
>       }
> 
> Reported-by: Alexander Potapenko <gli...@google.com>
> Cc: sta...@vger.kernel.org
> Signed-off-by: Eric Biggers <ebigg...@google.com>

Applied to the ipsec tree, thanks Eric!

Reply via email to