summaryrefslogtreecommitdiff
path: root/net/netfilter/ipset/ip_set_hash_netportnet.c
diff options
context:
space:
mode:
authorEric Dumazet <edumazet@google.com>2018-01-24 17:16:09 -0800
committerPablo Neira Ayuso <pablo@netfilter.org>2018-01-25 12:31:34 +0100
commitda17c73b6eb74aad3c3c0654394635675b623b3e (patch)
tree18783216423e8a3bbf86391b2e940424c0b2dba4 /net/netfilter/ipset/ip_set_hash_netportnet.c
parent889c604fd0b5f6d3b8694ade229ee44124de1127 (diff)
netfilter: x_tables: avoid out-of-bounds reads in xt_request_find_{match|target}
It looks like syzbot found its way into netfilter territory. Issue here is that @name comes from user space and might not be null terminated. Out-of-bound reads happen, KASAN is not happy. v2 added similar fix for xt_request_find_target(), as Florian advised. Signed-off-by: Eric Dumazet <edumazet@google.com> Reported-by: syzbot <syzkaller@googlegroups.com> Acked-by: Florian Westphal <fw@strlen.de> Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
Diffstat (limited to 'net/netfilter/ipset/ip_set_hash_netportnet.c')
0 files changed, 0 insertions, 0 deletions