From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 4E84F2940A; Tue, 23 Jan 2024 00:51:48 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1705971108; cv=none; b=Ag7vn4xEVzmqj2yuQJ1NVx2PhyZb99Fmb83zJcJFQVSyI9cyGIdYaetw1KFvNe1na1ZXYhGIDjXYcTZuN+JkxERxOyCYuUdeohGi8Ra3+kOAwynia2IJignh5zDD91HqaYiN4/d1MR4gcNgJrIPbsGyr+k02PqsOR+fOY9o6Wr4= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1705971108; c=relaxed/simple; bh=h7gH4j1NT9pEQ6GQ4RO5QyWzfOiZE5rRniS188hBjE4=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version:Content-Type; b=WSGdMo2f3+KUC0TXmmNtDO2iPut3cTl7XOfdcwSe+bp3m1wJr3b3aD4P2xnlqCyU49MbZGq0wvNmcrOXU60i+0EQxqLCkqf1MOZ2lVqAcebzPMubPB+yhW68Au2oUmyGDAf3CIhsDM9z9hRrLAsOyc/z0sFMxNZcEuRNDfx72SA= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b=wsgiuf/B; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b="wsgiuf/B" Received: by smtp.kernel.org (Postfix) with ESMTPSA id E6738C43390; Tue, 23 Jan 2024 00:51:47 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1705971108; bh=h7gH4j1NT9pEQ6GQ4RO5QyWzfOiZE5rRniS188hBjE4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=wsgiuf/BKmNenaG2+blhv1p/1cbyji7s7udvYIiWvCs7q/WXcQ45gSyojmwzDD21J b9Asv1tJy7/rYyxn8dgMiIEjJ7UapL1355xqfKU4+1ra65svN7ZA266WTeP/s2hwnJ E44qAQKWevNPG5aHv3xK7ycruuccil09C7Yp+r+g= From: Greg Kroah-Hartman To: stable@vger.kernel.org Cc: Greg Kroah-Hartman , patches@lists.linux.dev, Eric Paris , Konstantin Meskhidze , Paul Moore , Stephen Smalley , Muhammad Usama Anjum , =?UTF-8?q?Micka=C3=ABl=20Sala=C3=BCn?= , Sasha Levin Subject: [PATCH 5.10 076/286] selinux: Fix error priority for bind with AF_UNSPEC on PF_INET6 socket Date: Mon, 22 Jan 2024 15:56:22 -0800 Message-ID: <20240122235734.966728702@linuxfoundation.org> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20240122235732.009174833@linuxfoundation.org> References: <20240122235732.009174833@linuxfoundation.org> User-Agent: quilt/0.67 X-stable: review X-Patchwork-Hint: ignore Precedence: bulk X-Mailing-List: stable@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit 5.10-stable review patch. If anyone has any objections, please let me know. ------------------ From: Mickaël Salaün [ Upstream commit bbf5a1d0e5d0fb3bdf90205aa872636122692a50 ] The IPv6 network stack first checks the sockaddr length (-EINVAL error) before checking the family (-EAFNOSUPPORT error). This was discovered thanks to commit a549d055a22e ("selftests/landlock: Add network tests"). Cc: Eric Paris Cc: Konstantin Meskhidze Cc: Paul Moore Cc: Stephen Smalley Reported-by: Muhammad Usama Anjum Closes: https://lore.kernel.org/r/0584f91c-537c-4188-9e4f-04f192565667@collabora.com Fixes: 0f8db8cc73df ("selinux: add AF_UNSPEC and INADDR_ANY checks to selinux_socket_bind()") Signed-off-by: Mickaël Salaün Tested-by: Muhammad Usama Anjum Signed-off-by: Paul Moore Signed-off-by: Sasha Levin --- security/selinux/hooks.c | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c index ee37ce2e2619..f545321d96dc 100644 --- a/security/selinux/hooks.c +++ b/security/selinux/hooks.c @@ -4620,6 +4620,13 @@ static int selinux_socket_bind(struct socket *sock, struct sockaddr *address, in return -EINVAL; addr4 = (struct sockaddr_in *)address; if (family_sa == AF_UNSPEC) { + if (family == PF_INET6) { + /* Length check from inet6_bind_sk() */ + if (addrlen < SIN6_LEN_RFC2133) + return -EINVAL; + /* Family check from __inet6_bind() */ + goto err_af; + } /* see __inet_bind(), we only want to allow * AF_UNSPEC if the address is INADDR_ANY */ -- 2.43.0