lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 5 Aug 2008 10:51:32 -0700 From: David Stevens <dlstevens@...ibm.com> To: Nicolas Bareil <nico@...ir.org> Cc: netdev@...r.kernel.org, netdev-owner@...r.kernel.org Subject: Re: [BUG] before() integer overflow netdev-owner@...r.kernel.org wrote on 08/05/2008 10:19:18 AM: > > If seq1 = 0xffffff and seq2 = 0 (so seq1 > seq2), the difference is > equal to 0xffffff, or -1 as a 32 bits signed number. In the sequence space, 0xffffffff is before 0 (by 1), so before() should return true. In your example, you don't have enough f's for it to be -1 as a signed number, so I'm assuming you mean 8 of them there. If you mean 6 f's, then the result is not -1, but the positive number 0xffffff, which returns false. +-DLS -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists