This is a note to let you know that I've just added the patch titled ipv6: Check ip6_find_1stfragopt() return value properly. to the 3.18-stable tree which can be found at: http://www.kernel.org/git/?p=linux/kernel/git/stable/stable-queue.git;a=summary The filename of the patch is: ipv6-check-ip6_find_1stfragopt-return-value-properly.patch and it can be found in the queue-3.18 subdirectory. If you, or anyone else, feels it should not be added to the stable tree, please let <stable@xxxxxxxxxxxxxxx> know about it. >From foo@baz Fri Jun 2 12:04:25 JST 2017 From: "David S. Miller" <davem@xxxxxxxxxxxxx> Date: Wed, 17 May 2017 22:54:11 -0400 Subject: ipv6: Check ip6_find_1stfragopt() return value properly. From: "David S. Miller" <davem@xxxxxxxxxxxxx> [ Upstream commit 7dd7eb9513bd02184d45f000ab69d78cb1fa1531 ] Do not use unsigned variables to see if it returns a negative error or not. Fixes: 2423496af35d ("ipv6: Prevent overrun when parsing v6 header options") Reported-by: Julia Lawall <julia.lawall@xxxxxxx> Signed-off-by: David S. Miller <davem@xxxxxxxxxxxxx> Signed-off-by: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx> --- net/ipv6/ip6_offload.c | 9 ++++----- net/ipv6/ip6_output.c | 7 +++---- net/ipv6/udp_offload.c | 8 +++++--- 3 files changed, 12 insertions(+), 12 deletions(-) --- a/net/ipv6/ip6_offload.c +++ b/net/ipv6/ip6_offload.c @@ -62,7 +62,6 @@ static struct sk_buff *ipv6_gso_segment( const struct net_offload *ops; int proto; struct frag_hdr *fptr; - unsigned int unfrag_ip6hlen; u8 *prevhdr; int offset = 0; bool encap, udpfrag; @@ -121,10 +120,10 @@ static struct sk_buff *ipv6_gso_segment( skb->network_header = (u8 *)ipv6h - skb->head; if (udpfrag) { - unfrag_ip6hlen = ip6_find_1stfragopt(skb, &prevhdr); - if (unfrag_ip6hlen < 0) - return ERR_PTR(unfrag_ip6hlen); - fptr = (struct frag_hdr *)((u8 *)ipv6h + unfrag_ip6hlen); + int err = ip6_find_1stfragopt(skb, &prevhdr); + if (err < 0) + return ERR_PTR(err); + fptr = (struct frag_hdr *)((u8 *)ipv6h + err); fptr->frag_off = htons(offset); if (skb->next != NULL) fptr->frag_off |= htons(IP6_MF); --- a/net/ipv6/ip6_output.c +++ b/net/ipv6/ip6_output.c @@ -569,11 +569,10 @@ int ip6_fragment(struct sk_buff *skb, in u8 *prevhdr, nexthdr = 0; struct net *net = dev_net(skb_dst(skb)->dev); - hlen = ip6_find_1stfragopt(skb, &prevhdr); - if (hlen < 0) { - err = hlen; + err = ip6_find_1stfragopt(skb, &prevhdr); + if (err < 0) goto fail; - } + hlen = err; nexthdr = *prevhdr; mtu = ip6_skb_dst_mtu(skb); --- a/net/ipv6/udp_offload.c +++ b/net/ipv6/udp_offload.c @@ -29,6 +29,7 @@ static struct sk_buff *udp6_ufo_fragment u8 frag_hdr_sz = sizeof(struct frag_hdr); __wsum csum; int tnl_hlen; + int err; mss = skb_shinfo(skb)->gso_size; if (unlikely(skb->len <= mss)) @@ -93,9 +94,10 @@ static struct sk_buff *udp6_ufo_fragment /* Find the unfragmentable header and shift it left by frag_hdr_sz * bytes to insert fragment header. */ - unfrag_ip6hlen = ip6_find_1stfragopt(skb, &prevhdr); - if (unfrag_ip6hlen < 0) - return ERR_PTR(unfrag_ip6hlen); + err = ip6_find_1stfragopt(skb, &prevhdr); + if (err < 0) + return ERR_PTR(err); + unfrag_ip6hlen = err; nexthdr = *prevhdr; *prevhdr = NEXTHDR_FRAGMENT; unfrag_len = (skb_network_header(skb) - skb_mac_header(skb)) + Patches currently in stable-queue which might be from davem@xxxxxxxxxxxxx are queue-3.18/sctp-fix-src-address-selection-if-using-secondary-addresses-for-ipv6.patch queue-3.18/sctp-fix-icmp-processing-if-skb-is-non-linear.patch queue-3.18/sctp-do-not-inherit-ipv6_-mc-ac-fl-_list-from-parent.patch queue-3.18/tcp-avoid-fastopen-api-to-be-used-on-af_unspec.patch queue-3.18/s390-qeth-avoid-null-pointer-dereference-on-osn.patch queue-3.18/tcp-eliminate-negative-reordering-in-tcp_clean_rtx_queue.patch queue-3.18/s390-qeth-unbreak-osm-and-osn-support.patch queue-3.18/netem-fix-skb_orphan_partial.patch queue-3.18/dccp-tcp-do-not-inherit-mc_list-from-parent.patch queue-3.18/s390-qeth-handle-sysfs-error-during-initialization.patch queue-3.18/tcp-avoid-fragmenting-peculiar-skbs-in-sack.patch queue-3.18/ipv6-prevent-overrun-when-parsing-v6-header-options.patch queue-3.18/ipv6-check-ip6_find_1stfragopt-return-value-properly.patch queue-3.18/qmi_wwan-add-another-lenovo-em74xx-device-id.patch queue-3.18/ipv6-fix-out-of-bound-writes-in-__ip6_append_data.patch