mirror of
https://github.com/hardkernel/linux.git
synced 2026-04-02 03:03:00 +09:00
sctp: check af before verify address in sctp_addr_id2transport
[ Upstream commit912964eacb] Commit6f29a13061("sctp: sctp_addr_id2transport should verify the addr before looking up assoc") invoked sctp_verify_addr to verify the addr. But it didn't check af variable beforehand, once users pass an address with family = 0 through sockopt, sctp_get_af_specific will return NULL and NULL pointer dereference will be caused by af->sockaddr_len. This patch is to fix it by returning NULL if af variable is NULL. Fixes:6f29a13061("sctp: sctp_addr_id2transport should verify the addr before looking up assoc") Signed-off-by: Xin Long <lucien.xin@gmail.com> Acked-by: Marcelo Ricardo Leitner <marcelo.leitner@gmail.com> Signed-off-by: David S. Miller <davem@davemloft.net> Signed-off-by: Sasha Levin <alexander.levin@verizon.com> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
This commit is contained in:
committed by
Greg Kroah-Hartman
parent
399566f8a4
commit
168bd51ec5
@@ -239,7 +239,7 @@ static struct sctp_transport *sctp_addr_id2transport(struct sock *sk,
|
||||
union sctp_addr *laddr = (union sctp_addr *)addr;
|
||||
struct sctp_transport *transport;
|
||||
|
||||
if (sctp_verify_addr(sk, laddr, af->sockaddr_len))
|
||||
if (!af || sctp_verify_addr(sk, laddr, af->sockaddr_len))
|
||||
return NULL;
|
||||
|
||||
addr_asoc = sctp_endpoint_lookup_assoc(sctp_sk(sk)->ep,
|
||||
|
||||
Reference in New Issue
Block a user