[Top] [All Lists]

Re: Remote DoS vulnerability in Linux kernel 2.6.x (fwd)

To: James Morris <jmorris@xxxxxxxxxx>
Subject: Re: Remote DoS vulnerability in Linux kernel 2.6.x (fwd)
From: "David S. Miller" <davem@xxxxxxxxxx>
Date: Wed, 30 Jun 2004 14:42:30 -0700
Cc: netfilter-devel@xxxxxxxxxxxxxxxxxxx, laforge@xxxxxxxxxxxxx, netdev@xxxxxxxxxxx, arjanv@xxxxxxxxxx, kuznet@xxxxxxxxxxxxx
In-reply-to: <Xine.LNX.4.44.0406301507320.32316-100000@xxxxxxxxxxxxxxxxxxxxxxxx>
References: <Xine.LNX.4.44.0406301423320.32212-100000@xxxxxxxxxxxxxxxxxxxxxxxx> <Xine.LNX.4.44.0406301507320.32316-100000@xxxxxxxxxxxxxxxxxxxxxxxx>
Sender: netdev-bounce@xxxxxxxxxxx
On Wed, 30 Jun 2004 15:11:25 -0400 (EDT)
James Morris <jmorris@xxxxxxxxxx> wrote:

> FYI, I have audited options parsing code in TCP, IPv4 input and Netfilter 
> for any similar problems and not found any.  Further review would be 
> useful (I have not looked at the IPv6 header parsing for example).

I can't find any other cases.

This bug only came up because up the huge change Rusty and Harald did
to make these modules not access the SKB header data directly, and
instead to use local on-stack copies and skb_copy_bits().

<Prev in Thread] Current Thread [Next in Thread>