IPv6 frag: avoid overflow while parsing extension headers 13/1813/3
authorYoann Desmouceaux <ydesmouc@cisco.com>
Wed, 29 Jun 2016 16:30:29 +0000 (18:30 +0200)
committerDave Barach <openvpp@barachs.net>
Fri, 8 Jul 2016 14:17:19 +0000 (14:17 +0000)
commit0557a91ca727cee963a8179808d2d2108564ec56
tree325e06f1a05082ff23f6b15548babff2ac796767
parent4d5cabde54f847bccd365c64682e428aead30550
IPv6 frag: avoid overflow while parsing extension headers

A malicious packet could advertise an extension header length bigger than
the actual packet length, which would cause an overflow.

Change-Id: I277123e6fde6937b0170f2b2e33846bd22848ac4
Signed-off-by: Yoann Desmouceaux <ydesmouc@cisco.com>
vnet/vnet/ip/ip_frag.c