diff options
author | Mathias Krause <[email protected]> | 2013-02-23 01:13:47 +0000 |
---|---|---|
committer | David S. Miller <[email protected]> | 2013-02-23 13:51:54 -0500 |
commit | 6e601a53566d84e1ffd25e7b6fe0b6894ffd79c0 (patch) | |
tree | fb4a77a604c2cd35d53ec2600b9bf612a47407ef /lib/cpu-notifier-error-inject.c | |
parent | c9b20a5effcb29acf0f8a2a31c875073b2a0c74e (diff) |
sock_diag: Fix out-of-bounds access to sock_diag_handlers[]
Userland can send a netlink message requesting SOCK_DIAG_BY_FAMILY
with a family greater or equal then AF_MAX -- the array size of
sock_diag_handlers[]. The current code does not test for this
condition therefore is vulnerable to an out-of-bound access opening
doors for a privilege escalation.
Signed-off-by: Mathias Krause <[email protected]>
Acked-by: Eric Dumazet <[email protected]>
Signed-off-by: David S. Miller <[email protected]>
Diffstat (limited to 'lib/cpu-notifier-error-inject.c')
0 files changed, 0 insertions, 0 deletions