On Fri, 2013-08-23 at 23:04 -0400, Dong Fang wrote: > This patch fix the array overflow in nf_register_hook function > > Signed-off-by: Dong Fang <yp.fangdong@xxxxxxxxx> > --- > net/netfilter/core.c | 5 ++++- > 1 files changed, 4 insertions(+), 1 deletions(-) > > diff --git a/net/netfilter/core.c b/net/netfilter/core.c > index 2217363..819eee1 100644 > --- a/net/netfilter/core.c > +++ b/net/netfilter/core.c > @@ -68,8 +68,11 @@ static DEFINE_MUTEX(nf_hook_mutex); > int nf_register_hook(struct nf_hook_ops *reg) > { > struct nf_hook_ops *elem; > - int err; > + int err = -EINVAL; > > + if (reg->pf >= NFPROTO_NUMPROTO || reg->hooknum >= NF_MAX_HOOKS) > + return err; > + Thats a bug in the caller. We want a hard crash so that the poor netfilter guy who made this error can fix the bug before sending us a buggy patch. -- To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html