16/01/2019 10:49, Ananyev, Konstantin:
> From: Hu, Jiayu
> >
> > When the TCP header length of input packets is invalid (i.e., less
> > than 20 bytes or greater than 60 bytes), check_seq_option() will
> > access illegal memory area when compare TCP Options, which may
> > cause a segmentation fault
> -Original Message-
> From: Hu, Jiayu
> Sent: Wednesday, January 16, 2019 12:46 AM
> To: dev@dpdk.org
> Cc: Ananyev, Konstantin ; tho...@monjalon.net;
> Hu, Jiayu ; sta...@dpdk.org
> Subject: [PATCH v3] gro: add missing invalid TCP header length check
>
> When the TCP header length of
When the TCP header length of input packets is invalid (i.e., less
than 20 bytes or greater than 60 bytes), check_seq_option() will
access illegal memory area when compare TCP Options, which may
cause a segmentation fault.
This patch adds missing invalid TCP header length check to avoid
illegal me
3 matches
Mail list logo