Files
android_kernel_xiaomi_sm8450/include/net
Dan Carpenter fa5f7b51fc sctp: potential read out of bounds in sctp_ulpevent_type_enabled()
This code causes a static checker warning because Smatch doesn't trust
anything that comes from skb->data.  I've reviewed this code and I do
think skb->data can be controlled by the user here.

The sctp_event_subscribe struct has 13 __u8 fields and we want to see
if ours is non-zero.  sn_type can be any value in the 0-USHRT_MAX range.
We're subtracting SCTP_SN_TYPE_BASE which is 1 << 15 so we could read
either before the start of the struct or after the end.

This is a very old bug and it's surprising that it would go undetected
for so long but my theory is that it just doesn't have a big impact so
it would be hard to notice.

Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-09-13 16:59:47 -07:00
..
2017-07-11 06:08:58 -04:00
2017-04-05 10:15:20 +02:00
2017-09-12 20:41:02 -07:00
2017-04-24 12:35:56 -04:00
2016-07-08 12:20:57 +02:00
2016-04-25 16:44:27 -04:00
2016-04-25 16:44:27 -04:00
2016-06-09 23:41:03 -07:00
2015-03-06 21:50:02 -05:00
2017-08-31 14:42:19 -07:00
2015-09-17 17:18:37 -07:00
2016-02-16 20:21:48 -05:00
2017-04-14 10:06:42 +02:00
2016-05-20 18:03:16 -04:00
2016-04-27 22:48:25 -04:00
2017-02-03 15:16:45 -05:00
2017-06-15 12:12:40 -04:00
2016-08-17 19:36:23 -04:00
2016-10-03 02:00:22 -04:00
2016-07-08 12:20:57 +02:00
2016-03-23 22:09:58 -04:00
2016-12-25 17:21:22 +01:00
2017-01-09 16:07:41 -05:00
2015-03-12 22:58:12 -04:00
2017-06-15 12:12:40 -04:00
2016-05-03 16:08:14 -04:00