| To: | yoshfuji@xxxxxxxxxxxxxxxxx (YOSHIFUJI Hideaki / 吉藤英明) |
|---|---|
| Subject: | Re: [SECURITY] Overrun in ipv4 option parsing (Fw: (usagi-users 00222) |
| From: | kuznet@xxxxxxxxxxxxx |
| Date: | Thu, 22 Feb 2001 22:16:09 +0300 (MSK) |
| Cc: | netdev@xxxxxxxxxxx |
| In-reply-to: | <20010223011122P.yoshfuji@ecei.tohoku.ac.jp> from "YOSHIFUJI Hideaki / 吉藤英明" at Feb 22, 1 07:45:04 pm |
| Sender: | owner-netdev@xxxxxxxxxxx |
Hello! > itojun <itojun@xxxxxxxxxx> informed us that current > linux 2.2.x and 2.4.x kernels have buffer-overrun bug in > net/ipv4/ip_options.c. Here's the fix. The fix apparently adds useless check. I see no buffer overrrun. Alexey |
| <Prev in Thread] | Current Thread | [Next in Thread> |
|---|---|---|
| ||
| Previous by Date: | Re: Linux TCP over Satellite, Matti Aarnio |
|---|---|
| Next by Date: | Re: [SECURITY] Overrun in net/ipv6/exthdrs.c, kuznet |
| Previous by Thread: | [SECURITY] Overrun in ipv4 option parsing (Fw: (usagi-users 00222) IPv4 option handling), YOSHIFUJI Hideaki / 吉藤英明 |
| Next by Thread: | [SECURITY] Overrun in net/ipv6/exthdrs.c, YOSHIFUJI Hideaki / 吉藤英明 |
| Indexes: | [Date] [Thread] [Top] [All Lists] |