Re: [ovs-dev] [PATCH] odp-util: Add checking to prevent buffer overflow when parsing push_nsh

2018-11-15 Thread Ben Pfaff
On Tue, Nov 13, 2018 at 11:25:24AM -0800, Yifeng Sun wrote: > Previously, the buffer size of 'struct ofpbuf b' is less than the > size of 'char buf[512]', this could cause memory overflow of ofpbuf > when calling ofpbuf_put_hex. This patch fixes it. > > Reported-at: https://bugs.chromium.org/p/oss

[ovs-dev] [PATCH] odp-util: Add checking to prevent buffer overflow when parsing push_nsh

2018-11-13 Thread Yifeng Sun
Previously, the buffer size of 'struct ofpbuf b' is less than the size of 'char buf[512]', this could cause memory overflow of ofpbuf when calling ofpbuf_put_hex. This patch fixes it. Reported-at: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=10865 Signed-off-by: Yifeng Sun --- lib/odp-u