linux/net/openvswitch
Liping Zhang 69ec932e36 openvswitch: fix potential out of bound access in parse_ct
Before the 'type' is validated, we shouldn't use it to fetch the
ovs_ct_attr_lens's minlen and maxlen, else, out of bound access
may happen.

Fixes: 7f8a436eaa ("openvswitch: Add conntrack action")
Signed-off-by: Liping Zhang <zlpnobody@gmail.com>
Acked-by: Pravin B Shelar <pshelar@ovn.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-07-24 16:25:06 -07:00
..
actions.c Openvswitch: Refactor sample and recirc actions implementation 2017-03-22 11:28:35 -07:00
conntrack.c openvswitch: fix potential out of bound access in parse_ct 2017-07-24 16:25:06 -07:00
conntrack.h
datapath.c datapath: Avoid using stack larger than 1024. 2017-07-01 09:09:59 -07:00
datapath.h openvswitch: fix mis-ordered comment lines for ovs_skb_cb 2017-07-03 05:54:00 -07:00
dp_notify.c
flow.c openvswitch: Fix ovs_flow_key_update() 2017-04-01 12:16:46 -07:00
flow.h
flow_netlink.c net: store port/representator id in metadata_dst 2017-06-25 11:42:01 -04:00
flow_netlink.h
flow_table.c
flow_table.h
Kconfig
Makefile
vport-geneve.c
vport-gre.c
vport-internal_dev.c net: Fix inconsistent teardown and release of private netdev state. 2017-06-07 15:53:24 -04:00
vport-internal_dev.h
vport-netdev.c
vport-netdev.h
vport-vxlan.c vxlan: get rid of redundant vxlan_dev.flags 2017-06-20 13:37:02 -04:00
vport.c
vport.h