diff options
author | Gavrilov Ilia <[email protected]> | 2023-05-23 08:29:44 +0000 |
---|---|---|
committer | David S. Miller <[email protected]> | 2023-05-24 08:43:39 +0100 |
commit | 878ecb0897f4737a4c9401f3523fd49589025671 (patch) | |
tree | 6dd2f5ec7fe7f198dcc376e27b8c8adc38d6c3ef | |
parent | ba46c96db93905f93ebee8ed824cae6790a5ce34 (diff) |
ipv6: Fix out-of-bounds access in ipv6_find_tlv()
optlen is fetched without checking whether there is more than one byte to parse.
It can lead to out-of-bounds access.
Found by InfoTeCS on behalf of Linux Verification Center
(linuxtesting.org) with SVACE.
Fixes: c61a40432509 ("[IPV6]: Find option offset by type.")
Signed-off-by: Gavrilov Ilia <[email protected]>
Reviewed-by: Jiri Pirko <[email protected]>
Reviewed-by: David Ahern <[email protected]>
Signed-off-by: David S. Miller <[email protected]>
-rw-r--r-- | net/ipv6/exthdrs_core.c | 2 |
1 files changed, 2 insertions, 0 deletions
diff --git a/net/ipv6/exthdrs_core.c b/net/ipv6/exthdrs_core.c index da46c4284676..49e31e4ae7b7 100644 --- a/net/ipv6/exthdrs_core.c +++ b/net/ipv6/exthdrs_core.c @@ -143,6 +143,8 @@ int ipv6_find_tlv(const struct sk_buff *skb, int offset, int type) optlen = 1; break; default: + if (len < 2) + goto bad; optlen = nh[offset + 1] + 2; if (optlen > len) goto bad; |