sctp: Avoid memory overflow while FWD-TSN chunk is received with bad stream ID
commit9fcb95a105758b81ef0131cd18e2db5149f13e95
authorWei Yongjun <yjwei@cn.fujitsu.com>
Fri, 26 Dec 2008 00:58:11 +0000 (25 16:58 -0800)
committerDavid S. Miller <davem@davemloft.net>
Fri, 26 Dec 2008 00:58:11 +0000 (25 16:58 -0800)
treefc38a5c1a91a5137bc385b8bdc7cb30539776222
parentaea3c5c05d2c409e93bfa80dcedc06af7da6c13b
sctp: Avoid memory overflow while FWD-TSN chunk is received with bad stream ID

If FWD-TSN chunk is received with bad stream ID, the sctp will not do the
validity check, this may cause memory overflow when overwrite the TSN of
the stream ID.

The FORWARD-TSN chunk is like this:

FORWARD-TSN chunk
  Type                       = 192
  Flags                      = 0
  Length                     = 172
  NewTSN                     = 99
  Stream                     = 10000
  StreamSequence             = 0xFFFF

This patch fix this problem by discard the chunk if stream ID is not
less than MIS.

Signed-off-by: Wei Yongjun <yjwei@cn.fujitsu.com>
Signed-off-by: Vlad Yasevich <vladislav.yasevich@hp.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
net/sctp/sm_statefuns.c