Closed master-q closed 4 years ago
It's caused by unprivileged access. Such privilege may be easily avoided by ATS and VeriFast.
It's also caused by unprivileged access. Such privilege may be easily avoided by ATS and VeriFast.
It causes use-after-free on sctp_sharedkey_t
value in struct sctp_keyhead
list.
ATS and VeriFast may avoid this.
It's caused by no checking for length of mbuf. It may be hard to be avoided.
It's caused by miss checking size of packets. It may be hard to be avoided.
It's caused by IPsec specification. It may be hard to be avoided.
All issue are forked. This issue can be closed.
It's caused by uninitialized value. ATS may easily avoid this issue with at-view. But it may be difficult at VeriFast.
Fork https://github.com/metasepi/postmortem/issues/14.