Re: [PATCH net v3] tipc: check minimum bearer MTU

2016-12-02 Thread David Miller
From: Michal Kubecek Date: Fri, 2 Dec 2016 09:33:41 +0100 (CET) > Qian Zhang (张谦) reported a potential socket buffer overflow in > tipc_msg_build() which is also known as CVE-2016-8632: due to > insufficient checks, a buffer overflow can occur if MTU is too short for > even tipc headers. As anyo

Re: [PATCH net v3] tipc: check minimum bearer MTU

2016-12-02 Thread Ying Xue
On 12/02/2016 04:33 PM, Michal Kubecek wrote: Qian Zhang (张谦) reported a potential socket buffer overflow in tipc_msg_build() which is also known as CVE-2016-8632: due to insufficient checks, a buffer overflow can occur if MTU is too short for even tipc headers. As anyone can set device MTU in a

[PATCH net v3] tipc: check minimum bearer MTU

2016-12-02 Thread Michal Kubecek
Qian Zhang (张谦) reported a potential socket buffer overflow in tipc_msg_build() which is also known as CVE-2016-8632: due to insufficient checks, a buffer overflow can occur if MTU is too short for even tipc headers. As anyone can set device MTU in a user/net namespace, this issue can be abused by