Date: Mon, 30 Oct 2017 09:57:09 -0400 From: Mike Tancsa <mike@sentex.net> To: Eugene Grosbein <eugen@grosbein.net>, FreeBSD-STABLE Mailing List <freebsd-stable@freebsd.org> Subject: Re: ppp routing bug ? Message-ID: <082408ba-b756-696f-5885-226e4ccbd2ea@sentex.net> In-Reply-To: <59F25ED0.1010001@grosbein.net> References: <bdb4d277-40ca-5a8e-f0e0-c1734a0c88c6@sentex.net> <a23ed8b3-1050-12d5-6a7c-1a1a0c174251@sentex.net> <59F1B650.5070107@grosbein.net> <22c3cbd4-2a8e-884f-ec9b-cc4d12ff818f@sentex.net> <59F1EA48.1090500@grosbein.net> <a019ac21-fd1a-6f69-257f-4c03515ec963@sentex.net> <59F206CB.5000006@grosbein.net> <98f44309-d706-4cef-c0b2-0f08e0e1855c@sentex.net> <59F25ED0.1010001@grosbein.net>
next in thread | previous in thread | raw e-mail | index | archive | help
On 10/26/2017 6:16 PM, Eugene Grosbein wrote: > > That makes sense: ppp send bogus request to the routing socket and > the request has not RTF_HOST flag nor RTA_NETMASK address. > It seems, earlier kernel code masked this bug somehow but it does not now. > > Anyway, we have two bugs here: ppp sending bad request and kernel having > no enough checks for this somehow. > > Fixing ppp part would be easy. Please try this patch: Hi, Thanks again for the fix. Any chance of committing this to HEAD and then an MFC ? ---Mike -- ------------------- Mike Tancsa, tel +1 519 651 3400 Sentex Communications, mike@sentex.net Providing Internet services since 1994 www.sentex.net Cambridge, Ontario Canada http://www.tancsa.com/
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?082408ba-b756-696f-5885-226e4ccbd2ea>