lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 31 May 2019 08:57:41 -0700 From: Eric Dumazet <eric.dumazet@...il.com> To: Herbert Xu <herbert@...dor.apana.org.au>, Eric Dumazet <eric.dumazet@...il.com> Cc: Young Xiao <92siuyang@...il.com>, davem@...emloft.net, kuznet@....inr.ac.ru, yoshfuji@...ux-ipv6.org, netdev@...r.kernel.org, linux-kernel@...r.kernel.org, Steffen Klassert <steffen.klassert@...unet.com> Subject: Re: [PATCH] ipv6: Prevent overrun when parsing v6 header options On 5/31/19 7:54 AM, Herbert Xu wrote: > On Fri, May 31, 2019 at 07:50:06AM -0700, Eric Dumazet wrote: >> >> What do you mean by should ? >> >> Are they currently already linearized before the function is called, >> or is it missing and a bug needs to be fixed ? > > AFAICS this is the code-path for locally generated outbound packets. > Under what circumstances can the IPv6 header be not in the head? > > I guess this means we had yet another random submission from Young Xiao :/ Thanks.
Powered by blists - more mailing lists