mirror of
https://github.com/openwrt/openwrt.git
synced 2024-12-28 09:39:00 +00:00
38 lines
1.2 KiB
Diff
38 lines
1.2 KiB
Diff
|
From 38af9b1ac3242a4128e88069c495024caa565f0e Mon Sep 17 00:00:00 2001
|
||
|
From: Kevin Darbyshire-Bryant <kevin@darbyshire-bryant.me.uk>
|
||
|
Date: Tue, 29 Aug 2017 12:35:40 +0100
|
||
|
Subject: [PATCH] forward.c: fix CVE-2017-13704
|
||
|
|
||
|
Fix SIGSEGV in rfc1035.c answer_request() line 1228 where memset()
|
||
|
is called with header & limit pointing at the same address and thus
|
||
|
tries to clear memory from before the buffer begins.
|
||
|
|
||
|
answer_request() is called with an invalid edns packet size provided by
|
||
|
the client. Ensure the udp_size provided by the client is bounded by
|
||
|
512 and configured maximum as per RFC 6891 6.2.3 "Values lower than 512
|
||
|
MUST be treated as equal to 512"
|
||
|
|
||
|
The client that exposed the problem provided a payload udp size of 0.
|
||
|
|
||
|
Signed-off-by: Kevin Darbyshire-Bryant <kevin@darbyshire-bryant.me.uk>
|
||
|
---
|
||
|
src/forward.c | 2 ++
|
||
|
1 file changed, 2 insertions(+)
|
||
|
|
||
|
diff --git a/src/forward.c b/src/forward.c
|
||
|
index f22556a..62c5a5a 100644
|
||
|
--- a/src/forward.c
|
||
|
+++ b/src/forward.c
|
||
|
@@ -1408,6 +1408,8 @@ void receive_query(struct listener *listen, time_t now)
|
||
|
defaults to 512 */
|
||
|
if (udp_size > daemon->edns_pktsz)
|
||
|
udp_size = daemon->edns_pktsz;
|
||
|
+ if (udp_size < 512)
|
||
|
+ udp_size = 512; /* RFC 6891 6.2.3 */
|
||
|
}
|
||
|
|
||
|
#ifdef HAVE_AUTH
|
||
|
--
|
||
|
2.7.4
|
||
|
|