| To: | James Morris <jmorris@xxxxxxxxxx> |
|---|---|
| Subject: | Re: Remote DoS vulnerability in Linux kernel 2.6.x (fwd) |
| From: | "David S. Miller" <davem@xxxxxxxxxx> |
| Date: | Wed, 30 Jun 2004 14:42:30 -0700 |
| Cc: | netfilter-devel@xxxxxxxxxxxxxxxxxxx, laforge@xxxxxxxxxxxxx, netdev@xxxxxxxxxxx, arjanv@xxxxxxxxxx, kuznet@xxxxxxxxxxxxx |
| In-reply-to: | <Xine.LNX.4.44.0406301507320.32316-100000@thoron.boston.redhat.com> |
| References: | <Xine.LNX.4.44.0406301423320.32212-100000@thoron.boston.redhat.com> <Xine.LNX.4.44.0406301507320.32316-100000@thoron.boston.redhat.com> |
| Sender: | netdev-bounce@xxxxxxxxxxx |
On Wed, 30 Jun 2004 15:11:25 -0400 (EDT) James Morris <jmorris@xxxxxxxxxx> wrote: > FYI, I have audited options parsing code in TCP, IPv4 input and Netfilter > for any similar problems and not found any. Further review would be > useful (I have not looked at the IPv6 header parsing for example). I can't find any other cases. This bug only came up because up the huge change Rusty and Harald did to make these modules not access the SKB header data directly, and instead to use local on-stack copies and skb_copy_bits(). |
| <Prev in Thread] | Current Thread | [Next in Thread> |
|---|---|---|
| ||
| Previous by Date: | Re: [PATCH] [sparse] get rid of warnings from 8139too driver, Jeff Garzik |
|---|---|
| Next by Date: | Re: Check connect address in NETLINK, David S. Miller |
| Previous by Thread: | Re: Remote DoS vulnerability in Linux kernel 2.6.x (fwd), James Morris |
| Next by Thread: | (no subject), Luis R. Rodriguez |
| Indexes: | [Date] [Thread] [Top] [All Lists] |