|
From: | Florent Matignon |
Subject: | [lwip-devel] [task #12357] Ensure that malicious packets don't assert-fail |
Date: | Fri, 18 Oct 2013 15:02:08 +0000 |
User-agent: | Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:24.0) Gecko/20100101 Firefox/24.0 |
Follow-up Comment #1, task #12357 (project lwip): DHCP options parsing (dhcp_parse_reply() in dhcp.c) uses LWIP_ERROR assertions to check each option length retrieved from the packet. A packet with unexpected option length will trigger these fatal assertions. _______________________________________________________ Reply to this item at: <http://savannah.nongnu.org/task/?12357> _______________________________________________ Message posté via/par Savannah http://savannah.nongnu.org/
[Prev in Thread] | Current Thread | [Next in Thread] |