mbox

[0/1] netfilter TCP conntrack option parser fix

Message ID 1459330475-2220-1-git-send-email-kadlec@blackhole.kfki.hu
State Accepted
Delegated to: Pablo Neira
Headers show

Pull-request

git://blackhole.kfki.hu/nf master

Message

Jozsef Kadlecsik March 30, 2016, 9:34 a.m. UTC
Hi Pablo,

Please consider applying the next patch for the stable branches. It fixes
a one byte read after the buffer issue discovered by Baozeng Ding.

The following changes since commit 29421198c3a860092e27c2ad8499dfe603398817:

  netfilter: ipv4: fix NULL dereference (2016-03-28 17:59:29 +0200)

are available in the git repository at:

  git://blackhole.kfki.hu/nf master

for you to fetch changes up to becfb96a8663e3884d78c23ab747df3fe4e1e50d:

  net: netfilter: Fix stack out of bounds when parsing TCP options (2016-03-29 11:44:13 +0200)

----------------------------------------------------------------
Jozsef Kadlecsik (1):
      net: netfilter: Fix stack out of bounds when parsing TCP options

 net/netfilter/nf_conntrack_proto_tcp.c | 4 ++++
 1 file changed, 4 insertions(+)
--
To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html