On Mon, Apr 20, 2015 at 03:26:48PM +0800, Herbert Xu wrote:
> OK I have reviewed this and indeed it does appear that the bug
> can be triggered.  The trick appears to be making sure that your
> input packet is fragmented.  That should then activate the kmalloc
> path and lead to the memory corruption.

Yes that matches my testcase, the traffic I mentioned involves DNS
replies that are larger than the MTU and are sent as IP fragments.

-- 
Romain Francoise <[email protected]>
http://people.debian.org/~rfrancoise/


-- 
To UNSUBSCRIBE, email to [email protected]
with a subject of "unsubscribe". Trouble? Contact [email protected]
Archive: https://lists.debian.org/[email protected]

Reply via email to