-
-
Notifications
You must be signed in to change notification settings - Fork 375
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix heap-buffer-overflow issue in function cfg_mark_ports of file util/config_file.c #1040
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This fixes the out of bounds access.
- Fix #1040: fix heap-buffer-overflow issue in function cfg_mark_ports of file util/config_file.c.
The commits adjust the fix to have a different error text, for the user. Also the same check is repeated at the other code path where the port number is parsed and inserted into the array. It then also adds a check so that high numbers are limited to the 65536 array size, to stop it from taking a long time. Thank you for the fixes! This stops unbound from having trouble with malformed input causing invalid accesses. |
* nlnet/master: (24 commits) - Fix NLnetLabs#369: dnstap showing extra responses; for client responses right from the cache when replying with expired data or prefetching. - Fix NLnetLabs#1035: Potential Bug while parsing port from the "stub-host" string; also affected forward-zones and remote-control host directives. - For NLnetLabs#1040: adjust error text and disallow negative ports in other parts of cfg_mark_ports. Changelog note for NLnetLabs#1040 - Fix NLnetLabs#1040: fix heap-buffer-overflow issue in function cfg_mark_ports of file util/config_file.c. fix heap-buffer-overflow issue in function cfg_mark_ports of file util/config_file.c - Fix for crypto related failures to have a better error string. - Fix NLnetLabs#1034: DoT forward-zone via unbound-control. - Fix that the server does not chown the pidfile. - Fix that when the server truncates the pidfile, it does not follow symbolic links. - Fix to add unit test for lruhash space that exercises the routines. - Fix comment in lruhash space function. - Fix for NLnetLabs#1032, add safeguard to make table space positive. - Fix NLnetLabs#1032: The size of subnet_msg_cache calculation mistake cause memory usage increased beyond expectations. - Fix name of unit test for subnet cache response. - For NLnetLabs#831: Format text, use exclamation icon and explicit label names. Changelog entry for NLnetLabs#831 - Merge NLnetLabs#831 from Pierre4012: Improve Windows NSIS installer script (setup.nsi). Improve Windows NSIS installer script (setup.nsi) (NLnetLabs#831) - Fix localdata and rpz localdata to match CNAME only if no direct type match is available. - Fix rpz so that rpz CNAME can apply after rpz CNAME. And fix that clientip and nsip can give a CNAME. - Fix rpz for qtype CNAME after nameserver trigger. ...
This issue were assigned CVE-2024-43168 by Red Hat. |
Related PR is also #1062. |
fix #1039