Blame SOURCES/0001-Revert-Out-of-bounds-read-Overrunning-array-of-8-2-b.patch

221d9a
From e9c9117b7a84866366691110496984fc651e3e43 Mon Sep 17 00:00:00 2001
221d9a
From: Chris Leech <cleech@redhat.com>
221d9a
Date: Fri, 17 Jan 2020 13:42:10 -0800
221d9a
Subject: [PATCH 1/1] Revert "Out-of-bounds read: Overrunning array of 8 2-byte
221d9a
 elements"
221d9a
221d9a
It's been reported that this breaks IPv6 discovery with qedi controllers
221d9a
221d9a
This reverts commit af48f0d68db48cd492d0e27e046fc011be236fd3.
221d9a
---
221d9a
 iscsiuio/src/uip/ipv6.c | 2 +-
221d9a
 1 file changed, 1 insertion(+), 1 deletion(-)
221d9a
221d9a
diff --git a/iscsiuio/src/uip/ipv6.c b/iscsiuio/src/uip/ipv6.c
221d9a
index 5710199..05efa73 100644
221d9a
--- a/iscsiuio/src/uip/ipv6.c
221d9a
+++ b/iscsiuio/src/uip/ipv6.c
221d9a
@@ -521,7 +521,7 @@ static void ipv6_insert_protocol_chksum(struct ipv6_hdr *ipv6)
221d9a
 	sum = 0;
221d9a
 	ptr = (u16_t *)&ipv6->ipv6_src;
221d9a
 
221d9a
-	for (i = 0; i < sizeof(struct ipv6_addr); i += 2) {
221d9a
+	for (i = 0; i < sizeof(struct ipv6_addr); i++) {
221d9a
 		sum += HOST_TO_NET16(*ptr);
221d9a
 		ptr++;
221d9a
 	}
221d9a
-- 
221d9a
2.21.1
221d9a