From: Jason Wang Date: Fri, 1 Nov 2013 07:01:10 +0000 (+0800) Subject: net: flow_dissector: fail on evil iph->ihl X-Git-Tag: v3.2.54~6 X-Git-Url: https://git.fsl.cs.sunysb.edu/?a=commitdiff_plain;h=f7d537dc8714abf422238419d057376a772be9fd;p=unionfs-2.6.38.y.git net: flow_dissector: fail on evil iph->ihl commit 6f092343855a71e03b8d209815d8c45bf3a27fcd upstream. We don't validate iph->ihl which may lead a dead loop if we meet a IPIP skb whose iph->ihl is zero. Fix this by failing immediately when iph->ihl is evil (less than 5). This issue were introduced by commit ec5efe7946280d1e84603389a1030ccec0a767ae (rps: support IPIP encapsulation). Cc: Eric Dumazet Cc: Petr Matousek Cc: Michael S. Tsirkin Cc: Daniel Borkmann Signed-off-by: Jason Wang Acked-by: Eric Dumazet Signed-off-by: David S. Miller [bwh: Backported to 3.2: the affected code is in __skb_get_rxhash()] Signed-off-by: Ben Hutchings --- diff --git a/net/core/dev.c b/net/core/dev.c index ecf5ea254b1..7bcf37df0ce 100644 --- a/net/core/dev.c +++ b/net/core/dev.c @@ -2609,6 +2609,8 @@ ip: goto done; ip = (const struct iphdr *) (skb->data + nhoff); + if (ip->ihl < 5) + goto done; if (ip_is_fragment(ip)) ip_proto = 0; else