lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 18 Apr 2017 12:13:21 +0200 From: Wolfgang Bumiller <w.bumiller@...xmox.com> To: netdev@...r.kernel.org Cc: Jamal Hadi Salim <jhs@...atatu.com>, "David S. Miller" <davem@...emloft.net>, Cong Wang <xiyou.wangcong@...il.com> Subject: [PATCH v2 net 1/2] net sched actions: fix access to uninitialized data Signed-off-by: Wolfgang Bumiller <w.bumiller@...xmox.com> Acked-by: Cong Wang <xiyou.wangcong@...il.com> Acked-by: Jamal Hadi Salim <jhs@...atatu.com> --- (same as v1) net/sched/act_api.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/net/sched/act_api.c b/net/sched/act_api.c index b70aa57319ea..8cc883c063f0 100644 --- a/net/sched/act_api.c +++ b/net/sched/act_api.c @@ -604,7 +604,7 @@ struct tc_action *tcf_action_init_1(struct net *net, struct nlattr *nla, if (err < 0) goto err_mod; - if (tb[TCA_ACT_COOKIE]) { + if (name == NULL && tb[TCA_ACT_COOKIE]) { int cklen = nla_len(tb[TCA_ACT_COOKIE]); if (cklen > TC_COOKIE_MAX_SIZE) { -- 2.11.0
Powered by blists - more mailing lists