diff options
author | Kees Cook <keescook@chromium.org> | 2018-02-15 00:45:07 +0100 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2018-02-16 21:16:05 +0100 |
commit | fe9c842695e26d8116b61b80bfb905356f07834b (patch) | |
tree | 4290060a267efbab9953477c6e8a0e5751be97e2 /net/nfc/llcp_commands.c | |
parent | tls: getsockopt return record sequence number (diff) | |
download | linux-fe9c842695e26d8116b61b80bfb905356f07834b.tar.xz linux-fe9c842695e26d8116b61b80bfb905356f07834b.zip |
NFC: llcp: Limit size of SDP URI
The tlv_len is u8, so we need to limit the size of the SDP URI. Enforce
this both in the NLA policy and in the code that performs the allocation
and copy, to avoid writing past the end of the allocated buffer.
Fixes: d9b8d8e19b073 ("NFC: llcp: Service Name Lookup netlink interface")
Signed-off-by: Kees Cook <keescook@chromium.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'net/nfc/llcp_commands.c')
-rw-r--r-- | net/nfc/llcp_commands.c | 4 |
1 files changed, 4 insertions, 0 deletions
diff --git a/net/nfc/llcp_commands.c b/net/nfc/llcp_commands.c index 367d8c027101..2ceefa183cee 100644 --- a/net/nfc/llcp_commands.c +++ b/net/nfc/llcp_commands.c @@ -149,6 +149,10 @@ struct nfc_llcp_sdp_tlv *nfc_llcp_build_sdreq_tlv(u8 tid, char *uri, pr_debug("uri: %s, len: %zu\n", uri, uri_len); + /* sdreq->tlv_len is u8, takes uri_len, + 3 for header, + 1 for NULL */ + if (WARN_ON_ONCE(uri_len > U8_MAX - 4)) + return NULL; + sdreq = kzalloc(sizeof(struct nfc_llcp_sdp_tlv), GFP_KERNEL); if (sdreq == NULL) return NULL; |