linux-uconsole/include/net/sctp
Jakub Audykowicz f033651fba sctp: frag_point sanity check
[ Upstream commit afd0a8006e ]

If for some reason an association's fragmentation point is zero,
sctp_datamsg_from_user will try to endlessly try to divide a message
into zero-sized chunks. This eventually causes kernel panic due to
running out of memory.

Although this situation is quite unlikely, it has occurred before as
reported. I propose to add this simple last-ditch sanity check due to
the severity of the potential consequences.

Signed-off-by: Jakub Audykowicz <jakub.audykowicz@gmail.com>
Acked-by: Neil Horman <nhorman@tuxdriver.com>
Acked-by: Marcelo Ricardo Leitner <marcelo.leitner@gmail.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Signed-off-by: Sasha Levin <sashal@kernel.org>
2019-12-13 08:52:29 +01:00
..
auth.h sctp: add sockopt SCTP_AUTH_DEACTIVATE_KEY 2018-03-14 13:48:27 -04:00
checksum.h sctp: get sctphdr by offset in sctp_compute_cksum 2019-04-03 06:26:17 +02:00
command.h sctp: avoid running the sctp state machine recursively 2019-05-05 14:42:39 +02:00
constants.h sctp: remove old and unused SCTP_MIN_PMTU 2018-04-27 14:35:22 -04:00
sctp.h sctp: frag_point sanity check 2019-12-13 08:52:29 +01:00
sm.h sctp: fix the data size calculation in sctp_data_size 2018-10-17 22:32:21 -07:00
stream_interleave.h sctp: implement handle_ftsn for sctp_stream_interleave 2017-12-15 13:52:22 -05:00
stream_sched.h sctp: remove extern from stream sched 2017-11-28 11:00:13 -05:00
structs.h sctp: cache netns in sctp_ep_common 2019-12-05 09:21:32 +01:00
tsnmap.h
ulpevent.h sctp: implement abort_pd for sctp_stream_interleave 2017-12-11 11:23:05 -05:00
ulpqueue.h sctp: add support for the process of unordered idata 2017-12-11 11:23:05 -05:00