[NETFILTER]: Fix do_add_counters race, possible oops or info leak (CVE-2006-0039)
[deliverable/linux.git] / net / ipv4 / netfilter / arp_tables.c
index c2d92f99a2b8b0b18bc1f17e1ec742a2c6051de5..d0d19192026d9eb2327cf68a47a4ba1b23dc7fe5 100644 (file)
@@ -948,7 +948,7 @@ static int do_add_counters(void __user *user, unsigned int len)
 
        write_lock_bh(&t->lock);
        private = t->private;
-       if (private->number != paddc->num_counters) {
+       if (private->number != tmp.num_counters) {
                ret = -EINVAL;
                goto unlock_up_free;
        }
This page took 0.033279 seconds and 5 git commands to generate.