netdev
[Top] [All Lists]

Re: [SECURITY] Overrun in ipv4 option parsing (Fw: (usagi-users 00222)

To: yoshfuji@xxxxxxxxxxxxxxxxx (YOSHIFUJI Hideaki / 吉藤英明)
Subject: Re: [SECURITY] Overrun in ipv4 option parsing (Fw: (usagi-users 00222)
From: kuznet@xxxxxxxxxxxxx
Date: Thu, 22 Feb 2001 22:16:09 +0300 (MSK)
Cc: netdev@xxxxxxxxxxx
In-reply-to: <20010223011122P.yoshfuji@ecei.tohoku.ac.jp> from "YOSHIFUJI Hideaki / 吉藤英明" at Feb 22, 1 07:45:04 pm
Sender: owner-netdev@xxxxxxxxxxx
Hello!

> itojun <itojun@xxxxxxxxxx> informed us that current 
> linux 2.2.x and 2.4.x kernels have buffer-overrun bug in 
> net/ipv4/ip_options.c.  Here's the fix.

The fix apparently adds useless check. I see no buffer overrrun.

Alexey

<Prev in Thread] Current Thread [Next in Thread>