lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <20180829.181226.453921309779258159.davem@davemloft.net> Date: Wed, 29 Aug 2018 18:12:26 -0700 (PDT) From: David Miller <davem@...emloft.net> To: dcaratti@...hat.com Cc: jhs@...atatu.com, xiyou.wangcong@...il.com, netdev@...r.kernel.org, amir@...ai.me Subject: Re: [PATCH net] net/sched: act_pedit: fix dump of extended layered op From: Davide Caratti <dcaratti@...hat.com> Date: Mon, 27 Aug 2018 22:56:22 +0200 > in the (rare) case of failure in nla_nest_start(), missing NULL checks in > tcf_pedit_key_ex_dump() can make the following command > > # tc action add action pedit ex munge ip ttl set 64 > > dereference a NULL pointer: ... > Like it's done for other TC actions, give up dumping pedit rules and return > an error if nla_nest_start() returns NULL. > > Fixes: 71d0ed7079df ("net/act_pedit: Support using offset relative to the conventional network headers") > Signed-off-by: Davide Caratti <dcaratti@...hat.com> Applied and queued up for -stable, thanks.
Powered by blists - more mailing lists