summaryrefslogtreecommitdiff
path: root/proto_arp.c
diff options
context:
space:
mode:
Diffstat (limited to 'proto_arp.c')
0 files changed, 0 insertions, 0 deletions
-highlight'> Splicing from TCP socket is vulnerable when a packet with URG flag is received and stored into receive queue. __tcp_splice_read() returns 0, and sk_wait_data() immediately returns since there is the problematic skb in queue. This is a nice way to burn cpu (aka infinite loop) and trigger soft lockups. Again, this gem was found by syzkaller tool. Fixes: 9c55e01c0cc8 ("[TCP]: Splice receive support.") Signed-off-by: Eric Dumazet <edumazet@google.com> Reported-by: Dmitry Vyukov <dvyukov@google.com> Cc: Willy Tarreau <w@1wt.eu> Signed-off-by: David S. Miller <davem@davemloft.net> 2017-02-06hns: avoid stack overflow with CONFIG_KASANArnd Bergmann