From: Etienne Basset Date: Tue, 31 Mar 2009 21:54:11 +0000 (+0200) Subject: security/smack: fix oops when setting a size 0 SMACK64 xattr X-Git-Tag: v2.6.27.22~41 X-Git-Url: https://git.kernelconcepts.de/?a=commitdiff_plain;h=2d44563c1619317484982f0e46e246ebc9afe898;p=karo-tx-linux.git security/smack: fix oops when setting a size 0 SMACK64 xattr upstream commit: 4303154e86597885bc3cbc178a48ccbc8213875f this patch fix an oops in smack when setting a size 0 SMACK64 xattr eg attr -S -s SMACK64 -V '' somefile This oops because smk_import_entry treats a 0 length as SMK_MAXLEN Signed-off-by: Etienne Basset Reviewed-by: James Morris Acked-by: Casey Schaufler Signed-off-by: Chris Wright Signed-off-by: Greg Kroah-Hartman --- diff --git a/security/smack/smack_lsm.c b/security/smack/smack_lsm.c index 87d75417ea93..b80292354d04 100644 --- a/security/smack/smack_lsm.c +++ b/security/smack/smack_lsm.c @@ -604,6 +604,8 @@ static int smack_inode_setxattr(struct dentry *dentry, const char *name, strcmp(name, XATTR_NAME_SMACKIPOUT) == 0) { if (!capable(CAP_MAC_ADMIN)) rc = -EPERM; + if (size == 0) + rc = -EINVAL; } else rc = cap_inode_setxattr(dentry, name, value, size, flags); @@ -1360,7 +1362,7 @@ static int smack_inode_setsecurity(struct inode *inode, const char *name, struct socket *sock; int rc = 0; - if (value == NULL || size > SMK_LABELLEN) + if (value == NULL || size > SMK_LABELLEN || size == 0) return -EACCES; sp = smk_import(value, size);