Hi, siva gopi raju kudeti wrote, > Hi Waldemar, > > Thanks for the immediate replay. > > The patch you given looks good. I will make out this patch. > > After that, testing with the IPERF or PING is fine or any other way is > there to test. > > Can you please suggest me to do that.
Not sure how to test it. May be there is some information about it in the CVE. As it is in the RPC code, I suggest using some RPC services like NFSv3. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4429 I am not sure if any exploit exist, which you could use that the buffer overflow is fixed. best regards Waldemar _______________________________________________ devel mailing list devel@uclibc-ng.org http://mailman.uclibc-ng.org/cgi-bin/mailman/listinfo/devel