diff options
author | Alexander Bluhm <bluhm@cvs.openbsd.org> | 2024-03-26 23:48:50 +0000 |
---|---|---|
committer | Alexander Bluhm <bluhm@cvs.openbsd.org> | 2024-03-26 23:48:50 +0000 |
commit | efb18f0a4498dd75d7db0ccb02bc00bf3ebeb0a8 (patch) | |
tree | fac01e584a530a7776e57c92c48d5f5208645ba6 /sys/netinet6/ip6_var.h | |
parent | 46cb954358266bcfc31bc5f89434d89903df4e6c (diff) |
Additional length check for IPv6 reassembled fragments.
FreeBSD-SA-23:06.ipv6 security advisory has added an additional
overflow check in frag6_input(). OpenBSD is not affected by that
as the bug was introduced by another change in 2019. The existing
code is complicated and NetBSD has taken the FreeBSD fix, although
they were also not affected.
The additional check makes the complicated code more robust. Length
calculation taken from NetBSD. Discussed with FreeBSD.
OK sashan@ mvs@
Diffstat (limited to 'sys/netinet6/ip6_var.h')
0 files changed, 0 insertions, 0 deletions