Compare commits

...

10 Commits

Author SHA1 Message Date
openeuler-ci-bot
512d0ad3c6
!58 [sync] PR-55: Fix potential integer overflow in parsednssl
From: @openeuler-sync-bot 
Reviewed-by: @jiangheng12 
Signed-off-by: @jiangheng12
2025-01-07 13:47:34 +00:00
yinbin
354a2d837a Fix potential integer overflow in parsednssl
(cherry picked from commit d3c7a270a6bd4c0d291fa5135595211ee2379ee7)
2025-01-07 21:16:41 +08:00
openeuler-ci-bot
e351df485f
!53 update to 1.0.7
From: @tmacbb 
Reviewed-by: @robertxw 
Signed-off-by: @robertxw
2024-02-04 09:31:37 +00:00
tmacbb
a435f626eb update to 1.0.7 2024-02-01 20:14:49 +08:00
openeuler-ci-bot
b2544234d3
!32 Update NEWS
From: @cao-fei8 
Reviewed-by: @Charlie_li 
Signed-off-by: @Charlie_li
2023-01-09 06:29:18 +00:00
openeuler-ci-bot
d0808ebdc0
!22 Update AUTHORS
From: @cao-fei8 
Reviewed-by: @Charlie_li 
Signed-off-by: @Charlie_li
2023-01-07 09:23:06 +00:00
cao-fei8
930c0a8c6f Update NEWS
Signed-off-by: cao-fei8 <caofei@xfusion.com>
2023-01-07 06:43:49 +08:00
cao-fei8
689faea0d0 Update AUTHORS
Signed-off-by: cao-fei8 <caofei@xfusion.com>
2023-01-06 22:07:16 +08:00
openeuler-ci-bot
49d7268bd3
!18 rdnssd: remove unused parameter
From: @robertxw 
Reviewed-by: @zengwefeng 
Signed-off-by: @zengwefeng
2022-12-13 11:58:11 +00:00
gaoxingwang
5a823da953 rdnssd: remove unused parameter
Signed-off-by: gaoxingwang <gxw94linux@163.com>
2022-11-11 11:49:12 +08:00
4 changed files with 67 additions and 2 deletions

View File

@ -0,0 +1,34 @@
From fd9549c0fb0e1916ca553a1abbeebd48f608955d Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?David=20H=C3=A4rdeman?= <david@hardeman.nu>
Date: Sun, 11 Feb 2024 18:29:15 +0100
Subject: [PATCH] Fix potential integer overflow in parsednssl()
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
optlen is a uint8_t because the length field in the RA header is one octet
(representing the length in units of 8 octets). Later optlen is multiplied by 8
to represent the length in bytes, meaning that the variable can overflow.
Signed-off-by: David Härdeman <david@hardeman.nu>
Signed-off-by: Rémi Denis-Courmont <remi@remlab.net>
---
src/ndisc.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/src/ndisc.c b/src/ndisc.c
index 1640794..b190b18 100644
--- a/src/ndisc.c
+++ b/src/ndisc.c
@@ -451,7 +451,7 @@ static int
parsednssl (const uint8_t *opt)
{
const uint8_t *base;
- uint8_t optlen = opt[1];
+ uint16_t optlen = opt[1];
if (optlen < 2)
return -1;
--
2.34.1

Binary file not shown.

BIN
ndisc6-1.0.7.tar.bz2 Normal file

Binary file not shown.

View File

@ -1,6 +1,6 @@
Name: ndisc6
Version: 1.0.4
Release: 4
Version: 1.0.7
Release: 2
Summary: IPv6 diagnostic tools
License: GPLv2 or GPLv3
URL: http://www.remlab.net/ndisc6
@ -8,6 +8,7 @@ Source0: http://www.remlab.net/files/ndisc6/%{name}-%{version}.tar.bz2
Patch0: bugfix-add-self-mac-check.patch
Patch1: bugfix-add-SO_BINDTODEVICE.patch
Patch2: backport-Fix-potential-integer-overflow-in-parsednssl.patch
BuildRequires: gcc perl-generators
@ -47,6 +48,36 @@ It includes the follwing programs :
%{_mandir}/man*
%changelog
* Tue Jan 7 2025 yinbin <yinbin8@huawei.com> - 1.0.7-2
- Type: bugfix
- ID: NA
- SUG: NA
- DESC: Fix potential integer overflow in parsednssl
* Thu Feb 1 2024 liubo <liubo335@huawei.com> - 1.0.7-1
- Type: requirement
- ID: NA
- SUG: NA
- DESC: update to version 1.0.7
* Mon Jan 9 2023 caofei <caofei@xfusion.com> - 1.0.4-7
- Type:bugfix
- CVE:NA
- SUG:restart
- DESC: Update NEWS
* Sat Jan 7 2023 caofei <caofei@xfusion.com> - 1.0.4-6
- Type:bugfix
- CVE:NA
- SUG:restart
- DESC: Update AUTHORS
* Fri Nov 11 2022 gaoxingwang <gaoxingwang1@huawei.com> - 1.0.4-5
- Type:bugfix
- CVE:NA
- SUG:restart
- DESC: rdnssd: remove unused parameter
* Fri Apr 29 2022 gaoxingwang <gaoxingwang1@huawei.com> - 1.0.4-4
- Type:bugfix
- CVE:NA