diff options
author | Herbert Xu <herbert@gondor.apana.org.au> | 2005-07-26 15:43:17 -0700 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2005-07-26 15:43:17 -0700 |
commit | a4f1bac62564049ea4718c4624b0fadc9f597c84 (patch) | |
tree | 294ef690f2b8978ee83b9e4e7dadbfb391ea1f94 /net | |
parent | cadf01c2fc0cd66dfef4956ef1a6482ed01c3150 (diff) | |
download | op-kernel-dev-a4f1bac62564049ea4718c4624b0fadc9f597c84.zip op-kernel-dev-a4f1bac62564049ea4718c4624b0fadc9f597c84.tar.gz |
[XFRM]: Fix possible overflow of sock->sk_policy
Spotted by, and original patch by, Balazs Scheidler.
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'net')
-rw-r--r-- | net/xfrm/xfrm_user.c | 3 |
1 files changed, 3 insertions, 0 deletions
diff --git a/net/xfrm/xfrm_user.c b/net/xfrm/xfrm_user.c index ecade48..8da3e25 100644 --- a/net/xfrm/xfrm_user.c +++ b/net/xfrm/xfrm_user.c @@ -1350,6 +1350,9 @@ static struct xfrm_policy *xfrm_compile_policy(u16 family, int opt, if (nr > XFRM_MAX_DEPTH) return NULL; + if (p->dir > XFRM_POLICY_OUT) + return NULL; + xp = xfrm_policy_alloc(GFP_KERNEL); if (xp == NULL) { *dir = -ENOBUFS; |