diff options
author | Thomas Graf <tgraf@suug.ch> | 2006-07-05 20:45:06 -0700 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2006-07-05 20:45:06 -0700 |
commit | 26dab8930b408d5e5eb9ef496d68364dc955e249 (patch) | |
tree | 3ddcc939b167a66638b91fa423882048faf6b8ca /include/asm-i386/msgbuf.h | |
parent | e340221acda6bc0bf05a0ff6e6114902c4307670 (diff) |
[PKT_SCHED]: Fix illegal memory dereferences when dumping actions
The TCA_ACT_KIND attribute is used without checking its
availability when dumping actions therefore leading to a
value of 0x4 being dereferenced.
The use of strcmp() in tc_lookup_action_n() isn't safe
when fed with string from an attribute without enforcing
proper NUL termination.
Both bugs can be triggered with malformed netlink message
and don't require any privileges.
Signed-off-by: Thomas Graf <tgraf@suug.ch>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'include/asm-i386/msgbuf.h')
0 files changed, 0 insertions, 0 deletions