From owner-cvs-all Sun Jul 9 6: 2: 3 2000 Delivered-To: cvs-all@freebsd.org Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (Postfix) with ESMTP id 51E0437B51F; Sun, 9 Jul 2000 06:02:01 -0700 (PDT) (envelope-from itojun@FreeBSD.org) Received: (from itojun@localhost) by freefall.freebsd.org (8.9.3/8.9.2) id GAA36046; Sun, 9 Jul 2000 06:02:00 -0700 (PDT) (envelope-from itojun@FreeBSD.org) Message-Id: <200007091302.GAA36046@freefall.freebsd.org> From: Jun-ichiro itojun Hagino Date: Sun, 9 Jul 2000 06:02:00 -0700 (PDT) To: cvs-committers@FreeBSD.org, cvs-all@FreeBSD.org Subject: cvs commit: src/sys/netinet tcp_input.c X-FreeBSD-CVS-Branch: HEAD Sender: owner-cvs-all@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG itojun 2000/07/09 06:01:59 PDT Modified files: sys/netinet tcp_input.c Log: be more cautious about tcp option length field. drop bogus ones earlier. not sure if there is a real threat or not, but it seems that there's possibility for overrun/underrun (like non-NOP option with optlen > cnt). Revision Changes Path 1.117 +4 -2 src/sys/netinet/tcp_input.c To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe cvs-all" in the body of the message