Files
kernel_arpi/include/linux
Willem de Bruijn 9274124f02 net: stricter validation of untrusted gso packets
Syzkaller again found a path to a kernel crash through bad gso input:
a packet with transport header extending beyond skb_headlen(skb).

Tighten validation at kernel entry:

- Verify that the transport header lies within the linear section.

    To avoid pulling linux/tcp.h, verify just sizeof tcphdr.
    tcp_gso_segment will call pskb_may_pull (th->doff * 4) before use.

- Match the gso_type against the ip_proto found by the flow dissector.

Fixes: bfd5f4a3d6 ("packet: Add GSO/csum offload support.")
Reported-by: syzbot <syzkaller@googlegroups.com>
Signed-off-by: Willem de Bruijn <willemb@google.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2020-05-06 17:23:06 -07:00
..
2020-03-31 21:29:04 +02:00
2020-04-10 15:36:21 -07:00
2020-04-15 11:48:21 +02:00
2020-04-10 15:36:21 -07:00
2020-04-07 10:43:38 -07:00
2020-04-02 09:35:27 -07:00
2020-04-07 10:43:38 -07:00
2020-04-09 12:15:35 -05:00
2020-04-07 10:43:42 -07:00
2020-04-17 06:05:30 -04:00
2020-04-01 12:06:26 -04:00
2020-04-17 06:05:30 -04:00