Fix backport of "tcp: detect malicious patterns in tcp_collapse_ofo_queue()"
Based on review from Eric Dumazet, my backport of commit 3d4bf93ac12003f9b8e1e2de37fe27983deebdcf to older kernels was a bit incorrect. This patch fixes this. Reported-by: Eric Dumazet <edumazet@google.com> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org> Signed-off-by: Greg Kroah-Hartman <gregkh@google.com>
This commit is contained in:
parent
792e682a47
commit
7a77ef209c
1 changed files with 1 additions and 0 deletions
|
@ -4822,6 +4822,7 @@ static void tcp_collapse_ofo_queue(struct sock *sk)
|
|||
/* Start new segment */
|
||||
start = TCP_SKB_CB(skb)->seq;
|
||||
end = TCP_SKB_CB(skb)->end_seq;
|
||||
range_truesize = skb->truesize;
|
||||
} else {
|
||||
if (before(TCP_SKB_CB(skb)->seq, start))
|
||||
start = TCP_SKB_CB(skb)->seq;
|
||||
|
|
Loading…
Add table
Reference in a new issue