From owner-cvs-all Fri Jun 15 12:50:22 2001 Delivered-To: cvs-all@freebsd.org Received: from freefall.freebsd.org (freefall.freebsd.org [216.136.204.21]) by hub.freebsd.org (Postfix) with ESMTP id A861137B405; Fri, 15 Jun 2001 12:50:09 -0700 (PDT) (envelope-from ume@FreeBSD.org) Received: (from ume@localhost) by freefall.freebsd.org (8.11.3/8.11.3) id f5FJo9630642; Fri, 15 Jun 2001 12:50:09 -0700 (PDT) (envelope-from ume) Message-Id: <200106151950.f5FJo9630642@freefall.freebsd.org> From: Hajimu UMEMOTO Date: Fri, 15 Jun 2001 12:50:09 -0700 (PDT) To: cvs-committers@FreeBSD.org, cvs-all@FreeBSD.org Subject: cvs commit: src/sys/netinet tcp_input.c X-FreeBSD-CVS-Branch: RELENG_4 Sender: owner-cvs-all@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.ORG ume 2001/06/15 12:50:09 PDT Modified files: (Branch: RELENG_4) sys/netinet tcp_input.c Log: MFC 1.116->1.117: be more cautious about tcp option length field. drop bogus ones earlier. not sure if there is a real threat or not, but it seems that there's possibility for overrun/underrun (like non-NOP option with optlen > cnt). Revision Changes Path 1.107.2.11 +4 -2 src/sys/netinet/tcp_input.c To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe cvs-all" in the body of the message