summaryrefslogtreecommitdiff
path: root/net/ipv4/tcp.c
diff options
context:
space:
mode:
authorTodd Kjos <tkjos@android.com>2019-04-24 12:31:18 -0700
committerTodd Kjos <tkjos@google.com>2019-06-12 11:10:09 -0700
commit7b41aee921e20b15fb9f12d5042386ed2416f786 (patch)
tree86ad8fc06ed1fdf8c33cfc0e286726184d72c3e0 /net/ipv4/tcp.c
parent8236fb88a8c1ff2dfd9ac538ac54f8fbba2ade63 (diff)
UPSTREAM: binder: check for overflow when alloc for security context
commit 0b0509508beff65c1d50541861bc0d4973487dc5 upstream. When allocating space in the target buffer for the security context, make sure the extra_buffers_size doesn't overflow. This can only happen if the given size is invalid, but an overflow can turn it into a valid size. Fail the transaction if an overflow is detected. Bug: 130571081 Change-Id: Ibaec652d2073491cc426a4a24004a848348316bf Signed-off-by: Todd Kjos <tkjos@google.com> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'net/ipv4/tcp.c')
0 files changed, 0 insertions, 0 deletions