diff options
| author | Todd Kjos <tkjos@android.com> | 2019-04-24 12:31:18 -0700 |
|---|---|---|
| committer | Todd Kjos <tkjos@google.com> | 2019-06-11 15:49:00 -0700 |
| commit | 1cc130f95ec70352ac0935f7a52fd0250a5df5f7 (patch) | |
| tree | ae068a771a5529b7a8eeddb446e7492ec99aee18 /net/ipv4/tcp.c | |
| parent | 7846725776483c5e916c5f2954fe2a96c2fcbff7 (diff) | |
UPSTREAM: binder: check for overflow when alloc for security context
commit 0b0509508beff65c1d50541861bc0d4973487dc5 upstream.
When allocating space in the target buffer for the security context,
make sure the extra_buffers_size doesn't overflow. This can only
happen if the given size is invalid, but an overflow can turn it
into a valid size. Fail the transaction if an overflow is detected.
Bug: 130571081
Change-Id: Ibaec652d2073491cc426a4a24004a848348316bf
Signed-off-by: Todd Kjos <tkjos@google.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'net/ipv4/tcp.c')
0 files changed, 0 insertions, 0 deletions
