linux-uconsole/net/openvswitch
Liping Zhang 23f787ceeb openvswitch: fix potential out of bound access in parse_ct
[ Upstream commit 69ec932e36 ]

Before the 'type' is validated, we shouldn't use it to fetch the
ovs_ct_attr_lens's minlen and maxlen, else, out of bound access
may happen.

Fixes: 7f8a436eaa ("openvswitch: Add conntrack action")
Signed-off-by: Liping Zhang <zlpnobody@gmail.com>
Acked-by: Pravin B Shelar <pshelar@ovn.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2017-08-11 09:08:53 -07:00
..
actions.c openvswitch: use flow protocol when recalculating ipv6 checksums 2016-05-18 17:06:36 -07:00
conntrack.c openvswitch: fix potential out of bound access in parse_ct 2017-08-11 09:08:53 -07:00
conntrack.h
datapath.c net: preserve IP control block during GSO segmentation 2016-01-31 11:29:00 -08:00
datapath.h
dp_notify.c
flow.c
flow.h
flow_netlink.c net/openvswitch: Set the ipv6 source tunnel key address attribute correctly 2017-03-30 09:35:12 +02:00
flow_netlink.h
flow_table.c
flow_table.h
Kconfig
Makefile
vport-geneve.c
vport-gre.c
vport-internal_dev.c
vport-internal_dev.h
vport-netdev.c net: use skb_postpush_rcsum instead of own implementations 2016-05-18 17:06:36 -07:00
vport-netdev.h
vport-vxlan.c vxlan, gre, geneve: Set a large MTU on ovs-created tunnel devices 2016-06-24 10:18:18 -07:00
vport.c
vport.h net: use skb_postpush_rcsum instead of own implementations 2016-05-18 17:06:36 -07:00