|
From: | Jonas Rabenstein |
Subject: | [lwip-devel] [patch #9699] the overflow check in tcp_recved is not correct |
Date: | Wed, 10 Oct 2018 18:44:58 -0400 (EDT) |
User-agent: | Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36 |
URL: <https://savannah.nongnu.org/patch/?9699> Summary: the overflow check in tcp_recved is not correct Project: lwIP - A Lightweight TCP/IP stack Submitted by: ghostav Submitted on: Wed 10 Oct 2018 10:44:57 PM UTC Category: TCP Priority: 5 - Normal Status: None Privacy: Public Assigned to: None Originator Email: Open/Closed: Open Discussion Lock: Any Planned Release: None _______________________________________________________ Details: A variable is overflowed if the result of the addition is smaller than its previous value. The current implementation in tcp_received does this wrong by simply comparing the result of the addition to 0. _______________________________________________________ File Attachments: ------------------------------------------------------- Date: Wed 10 Oct 2018 10:44:57 PM UTC Name: 0001-tcp_recved-check-for-overflow-and-warn-about-too-big.patch Size: 2KiB By: ghostav <http://savannah.nongnu.org/patch/download.php?file_id=45179> _______________________________________________________ Reply to this item at: <https://savannah.nongnu.org/patch/?9699> _______________________________________________ Message sent via Savannah https://savannah.nongnu.org/
[Prev in Thread] | Current Thread | [Next in Thread] |