summaryrefslogtreecommitdiffstats
path: root/ripd/rip_zebra.c
diff options
context:
space:
mode:
authorPaul Jakma <paul.jakma@hpe.com>2016-02-08 14:46:28 +0000
committerPaul Jakma <paul.jakma@hpe.com>2016-03-08 17:53:22 +0000
commit2db962760426ddb9e266f9a4bc0b274584c819cc (patch)
tree406ea2dc4196e9904ab9832a7dae548f4cdcf91d /ripd/rip_zebra.c
parent405e9e19eb6ce62fa4f3f39a1f73990db9e146b7 (diff)
downloadquagga-2db962760426ddb9e266f9a4bc0b274584c819cc.tar.bz2
quagga-2db962760426ddb9e266f9a4bc0b274584c819cc.tar.xz
lib: zclient can overflow (struct interface) hw_addr if zebra is evil
* lib/zclient.c: (zebra_interface_if_set_value) The hw_addr_len field is used as trusted input to read off the hw_addr and write to the INTERFACE_HWADDR_MAX sized hw_addr field. The read from the stream is bounds-checked by the stream abstraction, however the write out to the heap can not be. Tighten the supplied length to stream_get used to do the write. Impact: a malicious zebra can overflow the heap of clients using the ZServ IPC. Note that zebra is already fairly trusted within Quagga. Reported-by: Kostya Kortchinsky <kostyak@google.com>
Diffstat (limited to 'ripd/rip_zebra.c')
0 files changed, 0 insertions, 0 deletions