summaryrefslogtreecommitdiff
path: root/user/tcpdump/CVE-2017-16808.patch
diff options
context:
space:
mode:
authorA. Wilcox <awilcox@wilcox-tech.com>2019-08-04 22:53:11 +0000
committerA. Wilcox <awilcox@wilcox-tech.com>2019-08-04 22:53:11 +0000
commit2d76f59134fc1cbd5ea3704b6d79761ffa50d6a9 (patch)
treec99a2ff0b1366a5f6bb2d61b13916acb3012cea6 /user/tcpdump/CVE-2017-16808.patch
parent8410df6cbcf43832292026f4487ca2642be5cf15 (diff)
parent3c0917832c46ca76601c4e2e7388c4570bfbcb86 (diff)
downloadpackages-2d76f59134fc1cbd5ea3704b6d79761ffa50d6a9.tar.gz
packages-2d76f59134fc1cbd5ea3704b6d79761ffa50d6a9.tar.bz2
packages-2d76f59134fc1cbd5ea3704b6d79761ffa50d6a9.tar.xz
packages-2d76f59134fc1cbd5ea3704b6d79761ffa50d6a9.zip
Merge branch 'cves' into 'master'
CVE catch up, part one See merge request adelie/packages!307
Diffstat (limited to 'user/tcpdump/CVE-2017-16808.patch')
-rw-r--r--user/tcpdump/CVE-2017-16808.patch26
1 files changed, 26 insertions, 0 deletions
diff --git a/user/tcpdump/CVE-2017-16808.patch b/user/tcpdump/CVE-2017-16808.patch
new file mode 100644
index 000000000..6b41aad8c
--- /dev/null
+++ b/user/tcpdump/CVE-2017-16808.patch
@@ -0,0 +1,26 @@
+From 28f610026d901660dd370862b62ec328727446a2 Mon Sep 17 00:00:00 2001
+From: Denis Ovsienko <denis@ovsienko.info>
+Date: Thu, 31 Aug 2017 21:15:37 +0100
+Subject: [PATCH] CVE-2017-16808/AoE: Add a missing bounds check.
+
+In aoev1_reserve_print() check bounds before trying to print an Ethernet
+address.
+
+This fixes a buffer over-read discovered by Bhargava Shastry,
+SecT/TU Berlin.
+---
+ print-aoe.c | 1 +
+ 1 file changed, 1 insertion(+)
+
+diff --git a/print-aoe.c b/print-aoe.c
+index 97e93df2e..2c78a55d3 100644
+--- a/print-aoe.c
++++ b/print-aoe.c
+@@ -325,6 +325,7 @@ aoev1_reserve_print(netdissect_options *ndo,
+ goto invalid;
+ /* addresses */
+ for (i = 0; i < nmacs; i++) {
++ ND_TCHECK2(*cp, ETHER_ADDR_LEN);
+ ND_PRINT((ndo, "\n\tEthernet Address %u: %s", i, etheraddr_string(ndo, cp)));
+ cp += ETHER_ADDR_LEN;
+ }