Fix sctp privilege elevation (CVE-2006-3745)
commit28ea23d9847cadc58edf3d10b8c1651f18b8d26b
authorSridhar Samudrala <sri@us.ibm.com>
Wed, 23 Aug 2006 16:01:55 +0000 (23 18:01 +0200)
committerAdrian Bunk <bunk@stusta.de>
Wed, 23 Aug 2006 16:01:55 +0000 (23 18:01 +0200)
tree31ac7bbb39abccec7551722ed1167289463f612d
parentb9a96aa8fa91f4f3187d141a84f0aeaed2935cbe
Fix sctp privilege elevation (CVE-2006-3745)

sctp_make_abort_user() now takes the msg_len along with the msg
so that we don't have to recalculate the bytes in iovec.
It also uses memcpy_fromiovec() so that we don't go beyond the
length allocated.

It is good to have this fix even if verify_iovec() is fixed to
return error on overflow.

Signed-off-by: Sridhar Samudrala <sri@us.ibm.com>
Acked-by: David Miller <davem@davemloft.net>
Signed-off-by: Adrian Bunk <bunk@stusta.de>
include/net/sctp/sctp.h
include/net/sctp/sm.h
net/sctp/sm_make_chunk.c
net/sctp/sm_statefuns.c
net/sctp/socket.c