lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 04 Jan 2019 13:00:47 -0800 (PST) From: David Miller <davem@...emloft.net> To: yihung.wei@...il.com Cc: netdev@...r.kernel.org, chrism@...lanox.com, gvrose8192@...il.com, pshelar@....org Subject: Re: [PATCH net] openvswitch: Fix IPv6 later frags parsing From: Yi-Hung Wei <yihung.wei@...il.com> Date: Thu, 3 Jan 2019 09:51:57 -0800 > The previous commit fa642f08839b > ("openvswitch: Derive IP protocol number for IPv6 later frags") > introduces IP protocol number parsing for IPv6 later frags that can mess > up the network header length calculation logic, i.e. nh_len < 0. > However, the network header length calculation is mainly for deriving > the transport layer header in the key extraction process which the later > fragment does not apply. > > Therefore, this commit skips the network header length calculation to > fix the issue. > > Reported-by: Chris Mi <chrism@...lanox.com> > Reported-by: Greg Rose <gvrose8192@...il.com> > Fixes: fa642f08839b ("openvswitch: Derive IP protocol number for IPv6 later frags") > Signed-off-by: Yi-Hung Wei <yihung.wei@...il.com> Applied.
Powered by blists - more mailing lists