tcp: enforce tcp_min_snd_mss in tcp_mtu_probing()
authorEric Dumazet <edumazet@google.com>
Sat, 8 Jun 2019 17:22:49 +0000 (10:22 -0700)
committerJason Liu <jason.hui.liu@nxp.com>
Fri, 6 Sep 2019 03:11:35 +0000 (11:11 +0800)
commit5c4cd7b751df3971046fe6e0b2445b18d8fd0415
tree444a3b9eb1b13e2f66a8809c4b39d74c25104704
parenta00a4d1ac1149768b6d627affdb8b7a08bbe9f1d
tcp: enforce tcp_min_snd_mss in tcp_mtu_probing()

commit 967c05aee439e6e5d7d805e195b3a20ef5c433d6 upstream.

If mtu probing is enabled tcp_mtu_probing() could very well end up
with a too small MSS.

Use the new sysctl tcp_min_snd_mss to make sure MSS search
is performed in an acceptable range.

CVE-2019-11479 -- tcp mss hardcoded to 48

Signed-off-by: Eric Dumazet <edumazet@google.com>
Reported-by: Jonathan Lemon <jonathan.lemon@gmail.com>
Cc: Jonathan Looney <jtl@netflix.com>
Acked-by: Neal Cardwell <ncardwell@google.com>
Cc: Yuchung Cheng <ycheng@google.com>
Cc: Tyler Hicks <tyhicks@canonical.com>
Cc: Bruce Curtis <brucec@netflix.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
(cherry picked from commit 59222807fcc99951dc769cd50e132e319d73d699)
net/ipv4/tcp_timer.c