netfilter: ipset: Check and reject crazy /0 input parameters
bitmap:ip and bitmap:ip,mac type did not reject such a crazy range
when created and using such a set results in a kernel crash.
The hash types just silently ignored such parameters.
Reject invalid /0 input parameters explicitely.
Signed-off-by:
Jozsef Kadlecsik <kadlec@blackhole.kfki.hu>
Showing
- net/netfilter/ipset/ip_set_bitmap_ip.c 6 additions, 4 deletionsnet/netfilter/ipset/ip_set_bitmap_ip.c
- net/netfilter/ipset/ip_set_bitmap_ipmac.c 3 additions, 2 deletionsnet/netfilter/ipset/ip_set_bitmap_ipmac.c
- net/netfilter/ipset/ip_set_hash_ip.c 1 addition, 1 deletionnet/netfilter/ipset/ip_set_hash_ip.c
- net/netfilter/ipset/ip_set_hash_ipport.c 1 addition, 1 deletionnet/netfilter/ipset/ip_set_hash_ipport.c
- net/netfilter/ipset/ip_set_hash_ipportip.c 1 addition, 1 deletionnet/netfilter/ipset/ip_set_hash_ipportip.c
- net/netfilter/ipset/ip_set_hash_ipportnet.c 1 addition, 1 deletionnet/netfilter/ipset/ip_set_hash_ipportnet.c
Loading
-
mentioned in commit e8886587
-
mentioned in commit dfd834cc
-
mentioned in commit feefb33e
-
mentioned in commit msm-3.18@e137d9bb
Please register or sign in to comment