xfrm: Fix xfrm sel prefix length validation
[ Upstream commit b38ff4075a80b4da5cb2202d7965332ca0efb213 ] Family of src/dst can be different from family of selector src/dst. Use xfrm selector family to validate address prefix length, while verifying new sa from userspace. Validated patch with this command: ip xfrm state add src 1.1.6.1 dst 1.1.6.2 proto esp spi 4260196 \ reqid 20004 mode tunnel aead "rfc4106(gcm(aes))" \ 0x1111016400000000000000000000000044440001 128 \ sel src 1011:1:4::2/128 sel dst 1021:1:4::2/128 dev Port5 Fixes: 07bf7908950a ("xfrm: Validate address prefix lengths in the xfrm selector.") Signed-off-by: Anirudh Gupta <anirudh.gupta@sophos.com> Acked-by: Herbert Xu <herbert@gondor.apana.org.au> Signed-off-by: Steffen Klassert <steffen.klassert@secunet.com> Signed-off-by: Sasha Levin <sashal@kernel.org>
This commit is contained in:
parent
33de7ba5ba
commit
228b0ef1df
1 changed files with 16 additions and 0 deletions
|
@ -150,6 +150,22 @@ static int verify_newsa_info(struct xfrm_usersa_info *p,
|
||||||
|
|
||||||
err = -EINVAL;
|
err = -EINVAL;
|
||||||
switch (p->family) {
|
switch (p->family) {
|
||||||
|
case AF_INET:
|
||||||
|
break;
|
||||||
|
|
||||||
|
case AF_INET6:
|
||||||
|
#if IS_ENABLED(CONFIG_IPV6)
|
||||||
|
break;
|
||||||
|
#else
|
||||||
|
err = -EAFNOSUPPORT;
|
||||||
|
goto out;
|
||||||
|
#endif
|
||||||
|
|
||||||
|
default:
|
||||||
|
goto out;
|
||||||
|
}
|
||||||
|
|
||||||
|
switch (p->sel.family) {
|
||||||
case AF_INET:
|
case AF_INET:
|
||||||
if (p->sel.prefixlen_d > 32 || p->sel.prefixlen_s > 32)
|
if (p->sel.prefixlen_d > 32 || p->sel.prefixlen_s > 32)
|
||||||
goto out;
|
goto out;
|
||||||
|
|
Loading…
Add table
Reference in a new issue