diff options
author | Kees Cook <keescook@chromium.org> | 2024-02-17 02:31:32 +0300 |
---|---|---|
committer | Florian Westphal <fw@strlen.de> | 2024-02-21 14:03:22 +0300 |
commit | 26f4dac11775a1ca24e2605cb30e828d4dbdea93 (patch) | |
tree | 52cacb9a443fc1fa968444b233b18d65137a4b4a /net/ipv4 | |
parent | 3f801968889459ecae1eab524b039676e6eaa319 (diff) | |
download | linux-26f4dac11775a1ca24e2605cb30e828d4dbdea93.tar.xz |
netfilter: x_tables: Use unsafe_memcpy() for 0-sized destination
The struct xt_entry_target fake flexible array has not be converted to a
true flexible array, which is mainly blocked by it being both UAPI and
used in the middle of other structures. In order to properly check for
0-sized destinations in memcpy(), an exception must be made for the one
place where it is still a destination. Since memcpy() was already
skipping checks for 0-sized destinations, using unsafe_memcpy() is no
change in behavior.
Signed-off-by: Kees Cook <keescook@chromium.org>
Reviewed-by: Simon Horman <horms@kernel.org>
Signed-off-by: Florian Westphal <fw@strlen.de>
Diffstat (limited to 'net/ipv4')
0 files changed, 0 insertions, 0 deletions