diff options
author | Eric Dumazet <edumazet@google.com> | 2017-02-05 08:18:55 +0100 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2017-02-05 23:23:04 +0100 |
commit | 7892032cfe67f4bde6fc2ee967e45a8fbaf33756 (patch) | |
tree | cbadc1cb0484fbdcd3d5d68d5189c1d022d0d0d4 /drivers/pcmcia/topic.h | |
parent | netlabel: out of bound access in cipso_v4_validate() (diff) | |
download | linux-7892032cfe67f4bde6fc2ee967e45a8fbaf33756.tar.xz linux-7892032cfe67f4bde6fc2ee967e45a8fbaf33756.zip |
ip6_gre: fix ip6gre_err() invalid reads
Andrey Konovalov reported out of bound accesses in ip6gre_err()
If GRE flags contains GRE_KEY, the following expression
*(((__be32 *)p) + (grehlen / 4) - 1)
accesses data ~40 bytes after the expected point, since
grehlen includes the size of IPv6 headers.
Let's use a "struct gre_base_hdr *greh" pointer to make this
code more readable.
p[1] becomes greh->protocol.
grhlen is the GRE header length.
Fixes: c12b395a4664 ("gre: Support GRE over IPv6")
Signed-off-by: Eric Dumazet <edumazet@google.com>
Reported-by: Andrey Konovalov <andreyknvl@google.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'drivers/pcmcia/topic.h')
0 files changed, 0 insertions, 0 deletions