Greetings,
I have decided to contact you privately via your email (d...@openvswitch.org)
for an inheritance funds deposited with your matching surname.Respond for
details.
Dr. Hiro KIYOKO
---
This email has been checked for viruses by Avast antivirus software.
https://www.avast.com/antivirus
On Sat, 2017-05-20 at 16:57 -0700, Ben Pfaff wrote:
> pinctrl_handle_put_dhcpv6_opts() and pinctrl_handle_dns_lookup() were not
> checking that a full UDP header was present before reading its udp_len
> field. This patch fixes the problem.
>
> I don't think that the system as a whole, as
On Sat, 2017-05-20 at 16:41 -0700, Ben Pfaff wrote:
> msg->size isn't the relevant measurement here because we're only supposed
> to read 'len' bytes. Reading more than that causes 'len' to underflow to a
> large number at the end of the loop.
>
> Reported-by: Bhargava Shastry
On Sat, 2017-05-20 at 11:09 -0700, Darrell Ball wrote:
> The checks to populate ct_orig_tuple in miniflow_extract
> includes recirc_id being non-zero. This is changed here
> to populate the ct_orig_tuple fields based only on ct_state
> per the logic of the design.
>
> Signed-off-by: Darrell Ball
pinctrl_handle_put_dhcpv6_opts() and pinctrl_handle_dns_lookup() were not
checking that a full UDP header was present before reading its udp_len
field. This patch fixes the problem.
I don't think that the system as a whole, as normally installed, was
exploitable. This is because pinctrl
msg->size isn't the relevant measurement here because we're only supposed
to read 'len' bytes. Reading more than that causes 'len' to underflow to a
large number at the end of the loop.
Reported-by: Bhargava Shastry
Signed-off-by: Ben Pfaff
---
On Fri, May 19, 2017 at 10:19:10AM +0200, Przemyslaw Lal wrote:
> On 18/05/2017 22:41, Ben Pfaff wrote:
>
> >On Thu, May 18, 2017 at 06:09:21PM +, Darrell Ball wrote:
> >>
> >>On 4/4/17, 5:47 PM, "Darrell Ball" wrote:
> >>
> >> On 4/4/17, 3:09 AM, "Lal, PrzemyslawX"
On Sat, May 20, 2017 at 06:33:03PM +0800, Yunjian Wang wrote:
> The memory leak was triggered each time on calling
> netflow_unref with containing netflow_flows.
>
> Signed-off-by: Yunjian Wang
> ---
> ofproto/netflow.c | 1 +
> 1 file changed, 1 insertion(+)
>
> diff
On Fri, May 19, 2017 at 10:57:17AM +, Szczerbik, PrzemyslawX wrote:
>
>
> > -Original Message-
> > From: Ben Pfaff [mailto:b...@ovn.org]
> > Sent: Friday, May 19, 2017 4:39 AM
> > To: Szczerbik, PrzemyslawX
> > Cc: d...@openvswitch.org
> > Subject:
On 5/19/17, 1:15 PM, "Joe Stringer" wrote:
On 17 May 2017 at 17:54, Joe Stringer wrote:
> On 17 May 2017 at 16:26, Darrell Ball wrote:
>>
>>
>> On 5/17/17, 2:19 PM, "Joe Stringer" wrote:
>>
>> On 16
The checks to populate ct_orig_tuple in miniflow_extract
includes recirc_id being non-zero. This is changed here
to populate the ct_orig_tuple fields based only on ct_state
per the logic of the design.
Signed-off-by: Darrell Ball
---
lib/flow.c | 5 -
1 file changed, 4
Nice to meet you, hope all is well with you and how are you enjoying your day?
I'm M Jessica Umeir, I am a U.S. Army officer, from the United States of
America, I am supportive and caring, i like swimming and cooking, i am gentle
although i am a soldier but i am kind, looking for a good
The memory leak was triggered each time on calling
netflow_unref with containing netflow_flows.
Signed-off-by: Yunjian Wang
---
ofproto/netflow.c | 1 +
1 file changed, 1 insertion(+)
diff --git a/ofproto/netflow.c b/ofproto/netflow.c
index 55f7814..6bcbfe5 100644
---
13 matches
Mail list logo