Skip to content

Fix GH-18309: ipv6 filter integer overflow #18312

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Closed
wants to merge 2 commits into from

Conversation

nielsdos
Copy link
Member

The intermediate computation can cause a signed integer overflow, but the input is correctly rejected later on by the check on variable n. Solve this by using an unsigned number.

@nielsdos nielsdos linked an issue Apr 11, 2025 that may be closed by this pull request
The intermediate computation can cause a signed integer overflow, but
the input is correctly rejected later on by the check on variable `n`.
Solve this by using an unsigned number.
@Girgias
Copy link
Member

Girgias commented Apr 11, 2025

CI failures are legit, seems there is a segfault somewhere?

@devnexen
Copy link
Member

seems i needs to remains signed ?

@nielsdos
Copy link
Member Author

Weird that this didn't happen locally. i must remain signed indeed because there's a backwards loop on i.

@nielsdos nielsdos closed this in 8849a53 Apr 11, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

ipv6 filter integer overflow
3 participants