commit | 328fc47ea0bcc27d9afa69c3ad6e52431cadd76c | [log] [tgz] |
---|---|---|
author | Vlad Yasevich <vladislav.yasevich@hp.com> | Wed Aug 27 16:08:54 2008 -0700 |
committer | David S. Miller <davem@davemloft.net> | Wed Aug 27 16:08:54 2008 -0700 |
tree | 5969688468a63ee01db68be4adff671bd9aa85c8 | |
parent | f2455eb176ac87081bbfc9a44b21c7cd2bc1967e [diff] |
sctp: correct bounds check in sctp_setsockopt_auth_key The bonds check to prevent buffer overlflow was not exactly right. It still allowed overflow of up to 8 bytes which is sizeof(struct sctp_authkey). Since optlen is already checked against the size of that struct, we are guaranteed not to cause interger overflow either. Signed-off-by: Vlad Yasevich <vladislav.yasevich@hp.com> Signed-off-by: David S. Miller <davem@davemloft.net>