asow...@redhat.com
> Subject: Re: [PATCH] tools/hv/hv_kvp_daemon.c: Netlink source address
> validation allows DoS
>
> From 6199072f8131056efce208f04e6985d1f9968d8e Mon Sep 17 00:00:00 2001
> From: Tomas Hozza
> Date: Mon, 5 Nov 2012 10:08:16 +0100
> Subject: [PATCH] Netlink source
; > Sent: Tuesday, November 06, 2012 10:21 AM
> > To: gre...@linuxfoundation.org; linux-kernel@vger.kernel.org;
> > de...@linuxdriverproject.org; a...@canonical.com;
> > jasow...@redhat.com
> > Cc: Olaf Hering; KY Srinivasan
> > Subject: [PATCH] tools/hv/hv_kvp_
ing; KY Srinivasan
> Subject: [PATCH] tools/hv/hv_kvp_daemon.c: Netlink source address validation
> allows DoS
>
> Hi.
>
> After discussion with KY Srinivasan and Olaf Hering I'm sending you
> a patch for the HyperV KVP daemon distributed in linux kernel
> "tools/hv/hv_
Hi.
After discussion with KY Srinivasan and Olaf Hering I'm sending you
a patch for the HyperV KVP daemon distributed in linux kernel
"tools/hv/hv_kvp_daemon.c".
There is an issue in the current daemon source causing hyperv kvp daemon
to exit when it processes a spoofed Netlink packet which has b
4 matches
Mail list logo