lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <166661401555.23160.8236193741276155568.git-patchwork-notify@kernel.org> Date: Mon, 24 Oct 2022 12:20:15 +0000 From: patchwork-bot+netdevbpf@...nel.org To: Lu Wei <luwei32@...wei.com> Cc: davem@...emloft.net, edumazet@...gle.com, kuba@...nel.org, pabeni@...hat.com, yoshfuji@...ux-ipv6.org, dsahern@...nel.org, ast@...nel.org, martin.lau@...nel.org, kuniyu@...zon.com, asml.silence@...il.com, imagedong@...cent.com, ncardwell@...gle.com, netdev@...r.kernel.org, linux-kernel@...r.kernel.org Subject: Re: [PATCH net,v3] tcp: fix a signed-integer-overflow bug in tcp_add_backlog() Hello: This patch was applied to netdev/net.git (master) by David S. Miller <davem@...emloft.net>: On Fri, 21 Oct 2022 12:06:22 +0800 you wrote: > The type of sk_rcvbuf and sk_sndbuf in struct sock is int, and > in tcp_add_backlog(), the variable limit is caculated by adding > sk_rcvbuf, sk_sndbuf and 64 * 1024, it may exceed the max value > of int and overflow. This patch reduces the limit budget by > halving the sndbuf to solve this issue since ACK packets are much > smaller than the payload. > > [...] Here is the summary with links: - [net,v3] tcp: fix a signed-integer-overflow bug in tcp_add_backlog() https://git.kernel.org/netdev/net/c/ec791d8149ff You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html
Powered by blists - more mailing lists