From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 0F5E05EE8F; Tue, 23 Jan 2024 00:41:33 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1705970493; cv=none; b=c4zmBzLnTpelVql4UuQvlmQF0QUlxp/U6UbH6yr0CDeauzeJesX4J9pYUKWej69cLsawbxti+FbYRasrixk/6Jj5eXRD+q7mH9xlarfPsx7CkgHL3PyRtsw7hM2fKgabjufLWZyHpQytdaIlRAEc5CiYf4gG4N2fwnAWCBJM6EQ= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1705970493; c=relaxed/simple; bh=h+SrUA8nZplgPreCpVCDoshGtH7JgcF9z8clCtE9PDQ=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version:Content-Type; b=h/YYgPbEC61Ct0rfpbVYemMSrbK8hr1l5N43VYKSU+s9U/qQGwvnopx7hqOj2BiV9Cnw5774Tvtjj7iME6/5V8M/GrKApZS8ESf3l0daguffoydAg4bUnSfxtfd+HL1ytGRS5h9c/qwA2szCSrIYJ5LVNNl1hHzJguPnAy9hNwE= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b=jxA3riE+; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b="jxA3riE+" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 7762AC43390; Tue, 23 Jan 2024 00:41:32 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1705970492; bh=h+SrUA8nZplgPreCpVCDoshGtH7JgcF9z8clCtE9PDQ=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=jxA3riE+rV4wGq0IY8AHwlE7Sc4sv0j57gXJ65zdbgD+IA24S5cro75DkaCx4pl59 bM0/yFfmrDmFNcYgPCdLJHxRNcS9fF9OsDz93AW2ieA1hNF6UcAspX859D1pB3kIFP 1coKyuAfTIHp+PZmER8o7PYv6hJNFS7Q1Q9l7PYU= From: Greg Kroah-Hartman To: stable@vger.kernel.org Cc: Greg Kroah-Hartman , patches@lists.linux.dev, Eric Paris , Konstantin Meskhidze , Paul Moore , Stephen Smalley , Muhammad Usama Anjum , =?UTF-8?q?Micka=C3=ABl=20Sala=C3=BCn?= , Sasha Levin Subject: [PATCH 6.1 033/417] selinux: Fix error priority for bind with AF_UNSPEC on PF_INET6 socket Date: Mon, 22 Jan 2024 15:53:21 -0800 Message-ID: <20240122235752.752990406@linuxfoundation.org> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20240122235751.480367507@linuxfoundation.org> References: <20240122235751.480367507@linuxfoundation.org> User-Agent: quilt/0.67 X-stable: review X-Patchwork-Hint: ignore Precedence: bulk X-Mailing-List: stable@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit 6.1-stable review patch. If anyone has any objections, please let me know. ------------------ From: Mickaël Salaün [ Upstream commit bbf5a1d0e5d0fb3bdf90205aa872636122692a50 ] The IPv6 network stack first checks the sockaddr length (-EINVAL error) before checking the family (-EAFNOSUPPORT error). This was discovered thanks to commit a549d055a22e ("selftests/landlock: Add network tests"). Cc: Eric Paris Cc: Konstantin Meskhidze Cc: Paul Moore Cc: Stephen Smalley Reported-by: Muhammad Usama Anjum Closes: https://lore.kernel.org/r/0584f91c-537c-4188-9e4f-04f192565667@collabora.com Fixes: 0f8db8cc73df ("selinux: add AF_UNSPEC and INADDR_ANY checks to selinux_socket_bind()") Signed-off-by: Mickaël Salaün Tested-by: Muhammad Usama Anjum Signed-off-by: Paul Moore Signed-off-by: Sasha Levin --- security/selinux/hooks.c | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c index d88c399b0e86..d45e9fa74e62 100644 --- a/security/selinux/hooks.c +++ b/security/selinux/hooks.c @@ -4690,6 +4690,13 @@ static int selinux_socket_bind(struct socket *sock, struct sockaddr *address, in return -EINVAL; addr4 = (struct sockaddr_in *)address; if (family_sa == AF_UNSPEC) { + if (family == PF_INET6) { + /* Length check from inet6_bind_sk() */ + if (addrlen < SIN6_LEN_RFC2133) + return -EINVAL; + /* Family check from __inet6_bind() */ + goto err_af; + } /* see __inet_bind(), we only want to allow * AF_UNSPEC if the address is INADDR_ANY */ -- 2.43.0