lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <74fbee87-2d73-1fde-ee3b-97e8c7382d01@redhat.com> Date: Sun, 7 May 2023 17:46:24 -0400 From: Jon Maloy <jmaloy@...hat.com> To: Xin Long <lucien.xin@...il.com>, network dev <netdev@...r.kernel.org>, tipc-discussion@...ts.sourceforge.net Cc: davem@...emloft.net, kuba@...nel.org, Eric Dumazet <edumazet@...gle.com>, Paolo Abeni <pabeni@...hat.com>, Tung Nguyen <tung.q.nguyen@...tech.com.au> Subject: Re: [PATCHv2 net 0/3] tipc: fix the mtu update in link mtu negotiation On 2023-05-02 18:13, Xin Long wrote: > This patchset fixes a crash caused by a too small MTU carried in the > activate msg. Note that as such malicious packet does not exist in > the normal env, the fix won't break any application > > The 1st patch introduces a function to calculate the minimum MTU for > the bearer, and the 2nd patch fixes the crash with this helper. While > at it, the 3rd patch fixes the udp bearer mtu update by netlink with > this helper. > > Xin Long (3): > tipc: add tipc_bearer_min_mtu to calculate min mtu > tipc: do not update mtu if msg_max is too small in mtu negotiation > tipc: check the bearer min mtu properly when setting it by netlink > > net/tipc/bearer.c | 17 +++++++++++++++-- > net/tipc/bearer.h | 3 +++ > net/tipc/link.c | 9 ++++++--- > net/tipc/udp_media.c | 5 +++-- > 4 files changed, 27 insertions(+), 7 deletions(-) > Series Acked-by: Jon Maloy <jmaloy@...hat.com>
Powered by blists - more mailing lists