• Home
  • Features
  • Pricing
  • Docs
  • Announcements
  • Sign In

osrg / ryu / 812 / 1
0%
master: 0%

Build:
DEFAULT BRANCH: master
Ran 25 Aug 2016 06:20AM UTC
Files 416
Run time 20s
Badge
Embed ▾
README BADGES
x

If you need to use a raster PNG badge, change the '.svg' to '.png' in the link

Markdown

Textile

RDoc

HTML

Rst

25 Aug 2016 06:04AM UTC coverage: 65.794% (+0.001%) from 65.793%
TOX_ENV=py27

push

travis-ci

fujita
Validate OpenFlow message length in header, to prevent controller receive loop DoS

When the controller receive loop currently accepts an OpenFlow
message, it does not validate the message length.  As a result, a
malicious or malfunctioning switch could cause send a message that
would result in the receive loop making no forward progress.

This patch ensures that the message length passed in the OpenFlow
message is validated against the specified minimum, and forced to that
value if it is smaller.

Thanks to Samuel Jero (at Purdue's Dependable and Secure Distributed
Systems Lab) for discovering this issue.

Signed-off-by: Victor J. Orlikowski <vjo@duke.edu>
Signed-off-by: FUJITA Tomonori <fujita.tomonori@lab.ntt.co.jp>

49859 of 75781 relevant lines covered (65.79%)

0.66 hits per line

Source Files on job 812.1 (TOX_ENV=py27)
  • Tree
  • List 0
  • Changed 1
  • Source Changed 1
  • Coverage Changed 1
Coverage ∆ File Lines Relevant Covered Missed Hits/Line
  • Back to Build 812
  • Travis Job 812.1
  • 09644f18 on github
  • Prev Job for TOX_ENV=py27 on master (#811.1)
  • Next Job for TOX_ENV=py27 on master (#815.1)
STATUS · Troubleshooting · Open an Issue · Sales · Support · CAREERS · ENTERPRISE · START FREE · SCHEDULE DEMO
ANNOUNCEMENTS · TWITTER · TOS & SLA · Supported CI Services · What's a CI service? · Automated Testing

© 2026 Coveralls, Inc