summaryrefslogtreecommitdiff
path: root/net/dsa
diff options
context:
space:
mode:
authorWillem de Bruijn <willemb@google.com>2020-05-04 19:48:54 +0300
committerDavid S. Miller <davem@davemloft.net>2020-05-07 03:23:06 +0300
commit9274124f023b5c56dc4326637d4f787968b03607 (patch)
tree0f46c00bd05149b9747ab50c1e290a56fb7b5ee6 /net/dsa
parent0cb7498f234e4e7d75187a8cae6c7c2053f2488a (diff)
downloadlinux-9274124f023b5c56dc4326637d4f787968b03607.tar.xz
net: stricter validation of untrusted gso packets
Syzkaller again found a path to a kernel crash through bad gso input: a packet with transport header extending beyond skb_headlen(skb). Tighten validation at kernel entry: - Verify that the transport header lies within the linear section. To avoid pulling linux/tcp.h, verify just sizeof tcphdr. tcp_gso_segment will call pskb_may_pull (th->doff * 4) before use. - Match the gso_type against the ip_proto found by the flow dissector. Fixes: bfd5f4a3d605 ("packet: Add GSO/csum offload support.") Reported-by: syzbot <syzkaller@googlegroups.com> Signed-off-by: Willem de Bruijn <willemb@google.com> Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'net/dsa')
0 files changed, 0 insertions, 0 deletions