summaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorJozsef Kadlecsik <kadlec@blackhole.kfki.hu>2016-03-30 11:34:35 +0200
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>2019-03-23 08:44:29 +0100
commitb71ec041cce35620b2e31cb94c756d73afb494f6 (patch)
tree73339d402a4425e495da36c1c9d6a386168cdf42 /security
parenta55ea87f70ae91cdce8c8fcb0e2a8821b23df15e (diff)
downloadlinux-stable-b71ec041cce35620b2e31cb94c756d73afb494f6.tar.gz
linux-stable-b71ec041cce35620b2e31cb94c756d73afb494f6.tar.bz2
linux-stable-b71ec041cce35620b2e31cb94c756d73afb494f6.zip
netfilter: nf_conntrack_tcp: Fix stack out of bounds when parsing TCP options
commit 644c7e48cb59cfc6988ddc7bf3d3b1ba5fe7fa9d upstream. Baozeng Ding reported a KASAN stack out of bounds issue - it uncovered that the TCP option parsing routines in netfilter TCP connection tracking could read one byte out of the buffer of the TCP options. Therefore in the patch we check that the available data length is large enough to parse both TCP option code and size. Reported-by: Baozeng Ding <sploving1@gmail.com> Tested-by: Baozeng Ding <sploving1@gmail.com> Signed-off-by: Jozsef Kadlecsik <kadlec@blackhole.kfki.hu> Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org> Cc: Zubin Mithra <zsm@chromium.org> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'security')
0 files changed, 0 insertions, 0 deletions