From 7a77ef209cfb4e760c70e56bc5fdeaed8f34ed45 Mon Sep 17 00:00:00 2001 From: Greg Kroah-Hartman Date: Fri, 27 Jul 2018 13:58:53 +0200 Subject: Fix backport of "tcp: detect malicious patterns in tcp_collapse_ofo_queue()" Based on review from Eric Dumazet, my backport of commit 3d4bf93ac12003f9b8e1e2de37fe27983deebdcf to older kernels was a bit incorrect. This patch fixes this. Reported-by: Eric Dumazet Signed-off-by: Greg Kroah-Hartman Signed-off-by: Greg Kroah-Hartman --- net/ipv4/tcp_input.c | 1 + 1 file changed, 1 insertion(+) diff --git a/net/ipv4/tcp_input.c b/net/ipv4/tcp_input.c index cc9874d7f223..d3b7172b9ee0 100644 --- a/net/ipv4/tcp_input.c +++ b/net/ipv4/tcp_input.c @@ -4822,6 +4822,7 @@ static void tcp_collapse_ofo_queue(struct sock *sk) /* Start new segment */ start = TCP_SKB_CB(skb)->seq; end = TCP_SKB_CB(skb)->end_seq; + range_truesize = skb->truesize; } else { if (before(TCP_SKB_CB(skb)->seq, start)) start = TCP_SKB_CB(skb)->seq; -- cgit v1.2.3