[ovs-dev] [PATCHv3] netlink: added check to prevent netlink attribute overflow

Ben Pfaff blp at ovn.org
Fri Feb 22 20:43:39 UTC 2019


On Tue, Feb 19, 2019 at 10:55:02AM -0800, Toms Atteka wrote:
> If enough large input is passed to odp_actions_from_string it can
> cause netlink attribute to overflow.
> Check for buffer size was added to prevent entering this function
> and returning appropriate error code.
> 
> Basic manual testing was performed.
> 
> Reported-by:
> https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=12231
> Signed-off-by: Toms Atteka <cpp.code.lv at gmail.com>

Thanks, I applied this to master and backported it as far as needed.


More information about the dev mailing list