-
Notifications
You must be signed in to change notification settings - Fork 268
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Bug] heap-overflow in get_ipv6_next #718
Comments
Improved overflow protection added in PR #740 |
fklassen
added a commit
that referenced
this issue
Aug 26, 2022
Add end_ptr to key functions, which make it easier to implement overflow protections.
fklassen
added a commit
that referenced
this issue
Aug 26, 2022
…v6_next Bug #718 improved heap-overflow protection
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
You are opening a bug report against the Tcpreplay project: we use
GitHub Issues for tracking bug reports and feature requests.
If you have a question about how to use Tcpreplay, you are at the wrong
site. You can ask a question on the tcpreplay-users mailing list
or on Stack Overflow with [tcpreplay] tag.
General help is available here.
If you have a build issue, consider downloading the latest release
Otherwise, to report a bug, please fill out the reproduction steps
(below) and delete these introductory paragraphs. Thanks!
Describe the bug
There is a heap-overflow bug found in get_ipv6_next, can be triggered via tcprewrite + ASan
To Reproduce
Steps to reproduce the behavior:
output:
Screenshots
System (please complete the following information):
Credit
Han Zheng
NCNIPC of China
Hexhive
POC
POC2.zip
The text was updated successfully, but these errors were encountered: