tcp: Fix missing range_truesize enlargement in the backport
The 4.4.y stable backportdc6ae4dffd
for the upstream commit 3d4bf93ac120 ("tcp: detect malicious patterns in tcp_collapse_ofo_queue()") missed a line that enlarges the range_truesize value, which broke the whole check. Fixes:dc6ae4dffd
("tcp: detect malicious patterns in tcp_collapse_ofo_queue()") Signed-off-by: Takashi Iwai <tiwai@suse.de> Cc: Michal Kubecek <mkubecek@suse.cz>
This commit is contained in:
parent
438604aa02
commit
42962538cd
1 changed files with 1 additions and 0 deletions
|
@ -4835,6 +4835,7 @@ static void tcp_collapse_ofo_queue(struct sock *sk)
|
|||
end = TCP_SKB_CB(skb)->end_seq;
|
||||
range_truesize = skb->truesize;
|
||||
} else {
|
||||
range_truesize += skb->truesize;
|
||||
if (before(TCP_SKB_CB(skb)->seq, start))
|
||||
start = TCP_SKB_CB(skb)->seq;
|
||||
if (after(TCP_SKB_CB(skb)->end_seq, end))
|
||||
|
|
Loading…
Add table
Reference in a new issue