Skip to content

Commit 22ceddd

Browse files
tiwaiZhengShunQian
authored andcommitted
tcp: Fix missing range_truesize enlargement in the backport
The 4.4.y stable backport dc6ae4d for the upstream commit 3d4bf93 ("tcp: detect malicious patterns in tcp_collapse_ofo_queue()") missed a line that enlarges the range_truesize value, which broke the whole check. Fixes: dc6ae4d ("tcp: detect malicious patterns in tcp_collapse_ofo_queue()") Signed-off-by: Takashi Iwai <[email protected]> Cc: Michal Kubecek <[email protected]>
1 parent c6657b5 commit 22ceddd

File tree

1 file changed

+1
-0
lines changed

1 file changed

+1
-0
lines changed

net/ipv4/tcp_input.c

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4836,6 +4836,7 @@ static void tcp_collapse_ofo_queue(struct sock *sk)
48364836
end = TCP_SKB_CB(skb)->end_seq;
48374837
range_truesize = skb->truesize;
48384838
} else {
4839+
range_truesize += skb->truesize;
48394840
if (before(TCP_SKB_CB(skb)->seq, start))
48404841
start = TCP_SKB_CB(skb)->seq;
48414842
if (after(TCP_SKB_CB(skb)->end_seq, end))

0 commit comments

Comments
 (0)