Add boundary checks against IP options.
Obtained from: OpenBSD
This commit is contained in:
parent
11b96475f7
commit
707d00a304
@ -654,8 +654,11 @@ icmp_reflect(m)
|
||||
if (opt == IPOPT_NOP)
|
||||
len = 1;
|
||||
else {
|
||||
if (cnt < IPOPT_OLEN + sizeof(*cp))
|
||||
break;
|
||||
len = cp[IPOPT_OLEN];
|
||||
if (len <= 0 || len > cnt)
|
||||
if (len < IPOPT_OLEN + sizeof(*cp) ||
|
||||
len > cnt)
|
||||
break;
|
||||
}
|
||||
/*
|
||||
|
@ -1083,7 +1083,7 @@ ip_dooptions(m)
|
||||
goto bad;
|
||||
}
|
||||
optlen = cp[IPOPT_OLEN];
|
||||
if (optlen <= 0 || optlen > cnt) {
|
||||
if (optlen < IPOPT_OLEN + sizeof(*cp) || optlen > cnt) {
|
||||
code = &cp[IPOPT_OLEN] - (u_char *)ip;
|
||||
goto bad;
|
||||
}
|
||||
@ -1189,6 +1189,10 @@ nosourcerouting:
|
||||
break;
|
||||
|
||||
case IPOPT_RR:
|
||||
if (optlen < IPOPT_OFFSET + sizeof(*cp)) {
|
||||
code = &cp[IPOPT_OFFSET] - (u_char *)ip;
|
||||
goto bad;
|
||||
}
|
||||
if ((off = cp[IPOPT_OFFSET]) < IPOPT_MINOFF) {
|
||||
code = &cp[IPOPT_OFFSET] - (u_char *)ip;
|
||||
goto bad;
|
||||
|
@ -1382,8 +1382,10 @@ ip_pcbopts(optname, pcbopt, m)
|
||||
if (opt == IPOPT_NOP)
|
||||
optlen = 1;
|
||||
else {
|
||||
if (cnt < IPOPT_OLEN + sizeof(*cp))
|
||||
goto bad;
|
||||
optlen = cp[IPOPT_OLEN];
|
||||
if (optlen <= IPOPT_OLEN || optlen > cnt)
|
||||
if (optlen < IPOPT_OLEN + sizeof(*cp) || optlen > cnt)
|
||||
goto bad;
|
||||
}
|
||||
switch (opt) {
|
||||
|
Loading…
x
Reference in New Issue
Block a user