lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <ZXo_OMnkgL9s5gXt@t14s.localdomain> Date: Wed, 13 Dec 2023 20:33:12 -0300 From: Marcelo Ricardo Leitner <marcelo.leitner@...il.com> To: Eric Dumazet <edumazet@...gle.com> Cc: "David S . Miller" <davem@...emloft.net>, Jakub Kicinski <kuba@...nel.org>, Paolo Abeni <pabeni@...hat.com>, netdev@...r.kernel.org, eric.dumazet@...il.com, Willem de Bruijn <willemb@...gle.com> Subject: Re: [PATCH net] net: prevent mss overflow in skb_segment() On Tue, Dec 12, 2023 at 04:46:21PM +0000, Eric Dumazet wrote: > > Fixes: 3953c46c3ac7 ("sk_buff: allow segmenting based on frag sizes") > Signed-off-by: Eric Dumazet <edumazet@...gle.com> > Cc: Marcelo Ricardo Leitner <marcelo.leitner@...il.com> > Cc: Willem de Bruijn <willemb@...gle.com> Reviewed-by: Marcelo Ricardo Leitner <marcelo.leitner@...il.com>
Powered by blists - more mailing lists