Prev: cgroup: add missing __percpu markup in mm/memcontrol.c
Next: signo issues in arch/x86/kernel/traps.c
From: David Miller on 7 Aug 2010 23:30 From: Dmitry Popov <dp(a)highloadlab.com> Date: Sat, 7 Aug 2010 23:17:52 +0400 > From: Dmitry Popov <dp(a)highloadlab.com> > > tcp_parse_md5sig_option doesn't check md5sig option (TCPOPT_MD5SIG) > length, but tcp_v[46]_inbound_md5_hash assume that it's at least 16 > bytes long. > > Signed-off-by: Dmitry Popov <dp(a)highloadlab.com> I'll apply this, but the memcmp() we do against this pointer is always safe because there's at least skb_shared_info()'s worth of valid memory past skb->data guarenteed at all times which is much larger than 16 bytes. So at worst we'd access garbage, but never past a valid piece of allocated memory. Thanks. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo(a)vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/ |