-
- Downloads
llc: Improve setsockopt() handling of malformed user input
[ Upstream commit 1465036b10be4b8b00eb31c879e86de633ad74c1 ] copy_from_sockptr() is used incorrectly: return value is the number of bytes that could not be copied. Since it's deprecated, switch to copy_safe_from_sockptr(). Note: Keeping the `optlen != sizeof(int)` check as copy_safe_from_sockptr() by itself would also accept optlen > sizeof(int). Which would allow a more lenient handling of inputs. Fixes: 1da177e4 ("Linux-2.6.12-rc2") Suggested-by:David Wei <dw@davidwei.uk> Signed-off-by:
Michal Luczaj <mhal@rbox.co> Signed-off-by:
Paolo Abeni <pabeni@redhat.com> Signed-off-by:
Sasha Levin <sashal@kernel.org>
parent
cac34e44
No related branches found
No related tags found
Please register or sign in to comment