Files
linux/net
Mathias Krause 7bd46285b2 sock_diag: Fix out-of-bounds access to sock_diag_handlers[]
[ Upstream commit 6e601a5356 ]

Userland can send a netlink message requesting SOCK_DIAG_BY_FAMILY
with a family greater or equal then AF_MAX -- the array size of
sock_diag_handlers[]. The current code does not test for this
condition therefore is vulnerable to an out-of-bound access opening
doors for a privilege escalation.

Signed-off-by: Mathias Krause <minipli@googlemail.com>
Acked-by: Eric Dumazet <edumazet@google.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2013-02-28 05:38:41 -08:00
..
2012-07-19 10:48:00 -07:00
2013-02-08 01:49:49 -05:00
2012-05-17 18:45:20 -04:00
2013-02-12 18:51:11 -05:00
2012-09-26 21:10:25 -04:00
2010-10-15 15:53:27 +02:00