Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 30 Oct 2017 09:57:09 -0400
From:      Mike Tancsa <mike@sentex.net>
To:        Eugene Grosbein <eugen@grosbein.net>, FreeBSD-STABLE Mailing List <freebsd-stable@freebsd.org>
Subject:   Re: ppp routing bug ?
Message-ID:  <082408ba-b756-696f-5885-226e4ccbd2ea@sentex.net>
In-Reply-To: <59F25ED0.1010001@grosbein.net>
References:  <bdb4d277-40ca-5a8e-f0e0-c1734a0c88c6@sentex.net> <a23ed8b3-1050-12d5-6a7c-1a1a0c174251@sentex.net> <59F1B650.5070107@grosbein.net> <22c3cbd4-2a8e-884f-ec9b-cc4d12ff818f@sentex.net> <59F1EA48.1090500@grosbein.net> <a019ac21-fd1a-6f69-257f-4c03515ec963@sentex.net> <59F206CB.5000006@grosbein.net> <98f44309-d706-4cef-c0b2-0f08e0e1855c@sentex.net> <59F25ED0.1010001@grosbein.net>

next in thread | previous in thread | raw e-mail | index | archive | help
On 10/26/2017 6:16 PM, Eugene Grosbein wrote:
> 
> That makes sense: ppp send bogus request to the routing socket and
> the request has not RTF_HOST flag nor RTA_NETMASK address.
> It seems, earlier kernel code masked this bug somehow but it does not now.
> 
> Anyway, we have two bugs here: ppp sending bad request and kernel having
> no enough checks for this somehow.
> 
> Fixing ppp part would be easy. Please try this patch:


Hi, Thanks again for the fix.
	Any chance of committing this to HEAD and then an MFC ?

	---Mike


-- 
-------------------
Mike Tancsa, tel +1 519 651 3400
Sentex Communications, mike@sentex.net
Providing Internet services since 1994 www.sentex.net
Cambridge, Ontario Canada   http://www.tancsa.com/



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?082408ba-b756-696f-5885-226e4ccbd2ea>