Blame SOURCES/0173-icmp6-fix-no-respond-to-neighbor-solicit-message.patch

4fe85b
From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
4fe85b
From: Michael Chang <mchang@suse.com>
4fe85b
Date: Mon, 3 Nov 2014 16:27:45 +0800
4fe85b
Subject: [PATCH] icmp6 fix no respond to neighbor solicit message
4fe85b
4fe85b
The structure size used in grub_netbuff_pull to get the pointer to
4fe85b
option header is apparently wrong, which leads to subsequent range check
4fe85b
failed and therefore not responding to any neighbor solicit message in my
4fe85b
testing.
4fe85b
---
4fe85b
 grub-core/net/icmp6.c | 2 +-
4fe85b
 1 file changed, 1 insertion(+), 1 deletion(-)
4fe85b
4fe85b
diff --git a/grub-core/net/icmp6.c b/grub-core/net/icmp6.c
4fe85b
index 0843a15afda..78223946031 100644
4fe85b
--- a/grub-core/net/icmp6.c
4fe85b
+++ b/grub-core/net/icmp6.c
4fe85b
@@ -211,7 +211,7 @@ grub_net_recv_icmp6_packet (struct grub_net_buff *nb,
4fe85b
 	if (ttl != 0xff)
4fe85b
 	  break;
4fe85b
 	nbh = (struct neighbour_solicit *) nb->data;
4fe85b
-	err = grub_netbuff_pull (nb, sizeof (struct router_adv));
4fe85b
+	err = grub_netbuff_pull (nb, sizeof (*nbh));
4fe85b
 	if (err)
4fe85b
 	  {
4fe85b
 	    grub_netbuff_free (nb);