Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix buffer overflow when receive radius packet #35

Merged
merged 1 commit into from
Jan 24, 2022

Conversation

svlobanov
Copy link
Contributor

This patch fixes buffer overflow if radius packet contains invalid atribute length
and attrubute type from the following list: ipv4addr, ipv6addr or ifid

Reported-by: Chloe Ong
Reported-by: Eugene Lim spaceraccoon@users.noreply.github.com
Signed-off-by: Sergey V. Lobanov sergey@lobanov.in

@spaceraccoon
Copy link

Thanks @svlobanov , could you add one more credit:

Reported-by: Chloe Ong
Reported-by: Eugene Lim spaceraccoon@users.noreply.github.com
Reported-by: Kar Wei Loh

The patched code looks fine.

Thank you!

@spaceraccoon
Copy link

Apologies @svlobanov, we spotted one more issue, the size has not been specified for the ipv6prefix case. It is possible to overflow there too.

@svlobanov
Copy link
Contributor Author

@spaceraccoon thank you, the patch has been updated

This patch fixes buffer overflow if radius packet contains invalid atribute length
and attrubute type from the following list: ipv4addr, ipv6addr, ipv6prefix or ifid

Reported-by: Chloe Ong
Reported-by: Eugene Lim <spaceraccoon@users.noreply.github.com>
Reported-by: Kar Wei Loh

Signed-off-by: Sergey V. Lobanov <sergey@lobanov.in>
@spaceraccoon
Copy link

Hi @svlobanov , looks great, thanks!

@xebd xebd merged commit 0b4ef98 into accel-ppp:master Jan 24, 2022
@svlobanov svlobanov deleted the fix-radius-overflow branch January 24, 2022 08:24
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants