Fix integer overflow in IGMP protocol.

Security:	FreeBSD-SA-15:04.igmp
Security:	CVE-2015-1414
Found by:	Mateusz Kocielski, Logicaltrust
Analyzed by:	Marek Kroemeke, Mateusz Kocielski (shm@NetBSD.org) and
		22733db72ab3ed94b5f8a1ffcde850251fe6f466
Submited by:	Mariusz Zaborski <oshogbo@FreeBSD.org>
Reviewed by:	bms
This commit is contained in:
Xin LI 2015-02-25 05:42:59 +00:00
parent 7b7c7a0533
commit cfa498d88e
Notes: svn2git 2020-12-20 02:59:44 +00:00
svn path=/head/; revision=279262

View File

@ -1539,8 +1539,8 @@ igmp_input(struct mbuf **mp, int *offp, int proto)
case IGMP_VERSION_3: {
struct igmpv3 *igmpv3;
uint16_t igmpv3len;
uint16_t srclen;
int nsrc;
uint16_t nsrc;
int srclen;
IGMPSTAT_INC(igps_rcv_v3_queries);
igmpv3 = (struct igmpv3 *)igmp;